strategy

What’s your security strategy?

In this podcast recorded at Black Hat USA 2016 in Las Vegas, Chris Drake, CEO at Armor, talks about how corporate IT is being stretched thin. They have to tackle the corporate …

phishing

Multi-layered phishing mitigation

In this podcast recorded at Black Hat USA 2016, Eyal Benishti, CEO at IRONSCALES, talks about their multi-layered phishing mitigation solution, which brings together human …

cloud binary

Cloud security and data privacy laws

In this podcast recorded at Infosecurity Europe 2016, Willy Leichter, VP of Cloud Security at CipherCloud, talks about issues around cloud security and data privacy laws, and …

VERA

Secure any kind of data, wherever it goes

We’ve all experienced that moment when you realize that you’ve shared the wrong file with the wrong person, potentially even at the wrong time. You’ve lost …

Anomali threat intelligence

Why SMBs need threat intelligence

Most of the innovative work being done in information security comes from to small to medium sized companies. At the same time, there’s a lack of security solutions for …

container security

Container security for enterprise computing

The largest pain-point today for organizations moving to a container strategy is that containers are being adopted and managed by developers. Operations and security do not …

Acunetix

Web application security with Acunetix

Securing the web applications of today’s businesses is perhaps the most overlooked aspect of securing the enterprise. Web application hacking is on the rise with as many as …