In the realm of cybersecurity start-ups, there is a widely held belief that the key to success lies in obtaining investor capital. However, recent data from Crunchbase shows a significant 35% decline in funding, raising the question of whether this belief still holds true.
Read MoreMazin Ahmed (Founder and CTO at Fullhunt.io) explains how he built a successful cybersecurity startup during the COVID-19 pandemic.
Read MoreThreat actors deploying Atomic Stealer (AMOS) are launching malicious ad campaigns to target Mac users.
Read MoreNeil J. Walsh will discuss various interpretations of cybercrime, divergent regulatory frameworks, and discrepancies in digital forensic capabilities. Ensuring the accuracy of cybercrime reports worldwide poses a significant challenge
Read MoreData alone is not intelligence – but unified security systems can build an understanding of context around a piece of data, enabling better threat identification and decision-making.
Read MoreThere’s no globally accepted definition of cyber diplomacy or cyber crime. Developing those cross-border agreements is an important step to enable cooperation and resilience.
Read MoreAn interview with Michael Montoya (CISO at Equinix). He shares his perspective on changes in cybersecurity and the positive impact of security advocates.
Read MoreDelve into this question and gain valuable insights. Discover that the solution may be as straightforward as the initial query implies, as their diverse responses illuminate this reality, while also unveiling a few recurring themes.
Read MoreIn this interview, Daniel Maloney (SVP and Chief Security Officer at Verizon) shares the basics of getting out ahead of a threat, and reminds us that there’s no singular way to protect everything.
Read MoreDr. Kenneth Geers, External Communications Analyst at Very Good Security is providing insights on TCP/IP, a remarkable unifier that enables computers worldwide to communicate with each other.
Read MoreIt’s a misconception that cloud-based environments are inherently secure. Security operations for the cloud should include proactive threat hunting – and Gabrielle Hempel explains how to implement this.
Read MoreAn interview with Dr. Kenneth Geers (External Communications Analyst at Very Good Security), who promotes collaboration across borders to create greater cyber resilience.
Read More