Monday, May 17, 2021
Home Interviews

Interviews

CISOs Leverage Innovative Solutions to Rationalize their Cybersecurity Portfolio

CISOs Leverage Innovative Solutions to Rationalize their Cybersecurity Portfolio

“CISOs should rely on an ecosystem of trusted partners that can supplement and guide the organization. This will ultimately be far more effective,” says...
The Role of PKI-based Cybersecurity Systems in Today’s Enterprise Infrastructure

The Role of PKI-based Cybersecurity Systems in Today’s Enterprise Infrastructure

“CISOs should use 2021 to account for all certificates in their environments and put automated management in place. That way, once quantum-safe certificates are...
Maximizing Data Protection in Today’s Vulnerable Times

Maximizing Data Protection in Today’s Vulnerable Times

“A consistent global file lock, and concurrent burst-syncing to both the cloud and to each local filer offers real-time collaboration while addressing issues around...
Keeping Up with the Evolution of Threat Actors

Keeping Up with the Evolution of Threat Actors

“The Dark Web continues to evolve and is less of an unknown nowadays, with the number of active users increasing. It’s the perfect place...
Dealing with Leaks of Your Company Secrets- Jeremy Thomas

Dealing with Leaks of Your Company Secrets

“Secrets leaked publicly are unlike zero-day vulnerabilities or more sophisticated vulnerabilities. They are extremely easy to exploit without specific knowledge. A secret leaked publicly...
Steps CISOs can Take to Effectively Secure the Cloud Environments

Steps CISOs can Take to Effectively Secure the Cloud Environments

“Organizations should start with visibility and discovery to find out which users have access to applications and what data they can access. They must...
How SASE is Transforming Enterprise Network Security (1)

How SASE is Transforming Enterprise Network Security

“Even if another global crisis causes a scattering of users and devices trying to connect to a single network from multiple places and different...
How can Cybersecurity Teams Effectively Secure the Digital Movements of Enterprises

How can Cybersecurity Teams Effectively Secure the Digital Movements of Enterprises

“When teams implement strategies such as monitoring or access management in a silo, they miss the context that comes from the user's activity in...
Mazen-Dohaji

Cybersecurity in the Middle East – A Strategic Approach to Protecting...

“While we are seeing relief from the pandemic arriving in the Middle East, digital transformation and distributed working are trends that are still going...
Understanding Invisible Assets and Shadow IT

Understanding Invisible Assets and Shadow IT

“Rapid changes to where and how people access data can drive risk. Enterprises need to prioritize taking back control of their critical assets by...

Latest posts