Friday, May 20, 2022
Home Guest Author

Guest Author

Ekaterina Khrustaleva-03

The Growing Cost of Cybercrime: Why Organizations should Invest in Cybersecurity

By Ekaterina Khrustaleva, Chief Operating Officer at ImmuniWeb 2021 was a very stressful year for enterprises and government organizations alike due to an increase in...
Phil Robinson

Automated Red Teaming: The Pros and Cons

Phil Robinson, Principal Security Consultant and Founder of Prism Infosec Much has been made over the potential benefits of Continuous Automated Red Teaming (CART) over...
Tim Wallen

AI Driving the Security Agenda

Author: Tim Wallen, Regional Director, UK&I, LogPoint It's no secret that organizations are struggling to keep up with the ever-changing methods of cybercriminals and the...
Brett Raybould

SEO Poisoning: How attackers are exploiting the uptick in browser usage

Brett Raybould, EMEA Solutions Architect, Menlo Security.  Search engine optimization, or SEO as it may be better known, is a key pillar of modern marketing. As...
Transitioning from MSP to MSSP – is Now the Right Time?

Transitioning from MSP to MSSP – is Now the Right Time?

Cyber-attacks today are a daily occurrence. While high-profile attacks that cripple victims’ IT systems and prevent access to critical services make headlines, the threat...
Beyond Identity Access Management: The Next Steps in Post-Perimeter Defense

Beyond Identity Access Management: The Next Steps in Post-Perimeter Defense

The last few years have seen an increased acceptance that traditional perimeter-based defenses such as firewalls are not enough, and that attention needs to...
End-To-End and CEO Down: Why Organizations Need a “Whole Of Company” Approach to Cybersecurity

End-To-End and CEO Down: Why Organizations Need a “Whole Of Company”...

Author: Rick Jones, CEO, DigitalXRAID The White House recently described the approach needed to tackle security threats to businesses and critical infrastructure as a “whole...
Mitigating Risks During Payments & Customer Transactions

Mitigating Risks During Payments & Customer Transactions

Such is the intensity of the battle against cyber-threats, the legacy defenses of anti-virus and office firewalls are no longer adequate without additional support....
Common Roadblocks to Completing a SOC 2 Audit

Common Roadblocks to Completing a SOC 2 Audit

Author: Joseph Kirkpatrick is the President of Kirkpatrick Price A SOC 2 report helps enterprises to demonstrate they take security and privacy seriously. Enterprise leaders...
Why We Need to Prioritize Cyber Resilience

Why We Need to Prioritize Cyber Resilience

Author: Jon Fielding, Managing Director EMEA, Apricorn Through 2020 and into 2021, cyber threats have increasingly targeted the end-user working from home, with attackers exploiting unprepared...

Latest posts