HIPAA dashboard

Healthcare Ransomware Attacks: Understanding the Problem and How to Protect Your Organization

To say we live in an increasingly digital world would be quite an understatement. Modern technology is even intertwined deeply with the fabric of healthcare systems. As such, the specter of ransomware ...
We Hacked the Planet; Now What? Katie Moussouris

13 Women to Know in Cybersecurity

Conservative estimates have the current cybersecurity workforce as about 25% female, but that number is ...
How Government Agencies Can Defend Against Exfiltration Tactics

How Government Agencies Can Defend Against Exfiltration Tactics

| | Thought Leadership
In the wake of recent cyber attacks targeting governmental agencies, the need for robust cybersecurity measures has never been more pressing. Most recently, the hacking group R00tK1T has been in the spotlight ...

Logical Advice for CISOs on the SEC Cybersecurity Regulations Webcast Wrap-Up

| | Thought Leadership
On Monday, I was thrilled to host an informative webinar Logical Advice for CISOs on the SEC Cybersecurity Regulations. I want to thank our guests Richard Watson, Global Cybersecurity Consulting Leader at ...
decoding

Integrating Attack Surface Management and Penetration Testing as a Service

| | ASM, pentesting, Thought Leadership
Introduction In this extensive dive, we’re going to explore the intricacies of Attack Surface Management (ASM) and Penetration Testing as a Service (PTaaS), two critical components in the cybersecurity arsenal.... The post ...
Why I Joined CyberSaint: It’s All About Risk

Why I Joined CyberSaint: It’s All About Risk

As I join CyberSaint as Chief Product Officer, I can't help but reflect on the path that led me to this opportunity. In college, I remember listening to Pink Floyd’s “The Wall” ...
Insertion Confirmation

How to use DSF Collections & Index Patterns – A Tutorial

In conventional terminology, Imperva Data Security Fabric (DSF) is a database system, replete with a GUI interface for aggregation pipeline building, workflow orchestration, extensible scripting (Playbooks), and self-service data discovery (Kibana-based Discover) ...

IoT Email Authentication: Why It Matters

Internet of Things (IoT) email authentication is becoming ... The post IoT Email Authentication: Why It Matters appeared first on EasyDMARC ...

Combating the cybersecurity tools overload

Anyone who knows me knows my passion for hiking, so let me start with a question close to my heart – Have you explored a new trail while hiking? Imagine this: You ...

BIMI’s Visual Makeover: Gmail’s Blue Verified Checkmarks Make Headlines

Email authentication protocols (SPF, DKIM, and DMARC) have ... The post BIMI’s Visual Makeover: Gmail’s Blue Verified Checkmarks Make Headlines appeared first on EasyDMARC ...