by Gee Rittenhouse · December 22, 2022
At its heart, security is a data protection problem. Security vendors recognize this and have responded by creating sophisticated point solutions to secure data wherever it resides. Unfortunately, today’s data is everywhere. This requires organizations to stitch these disparate technologies together to produce a comprehensive solution.
Dropped Out of the Box – Dropbox’s Source Code Repositories Leaked
by Rodman Ramezanian · November 8, 2022
Today, threat actors leverage free cloud tools, such as hosting providers, file transfer services, collaboration platforms, calendar organizers, or a combination of each, to bypass security measures and disseminate malicious payloads around the world.
Protecting your Organization from Emerging Threats with Skyhigh Security
by Christoph Alme & Martin Stecher · December 12, 2022
Organizations have to deal with an ever-growing attack surface, where reactive models of security just cannot keep up with the size and complexity of today's threat landscape. Emerging threats have surpassed the tens of thousands per day, with a big chunk of malware unique to a single organization.
Ask Me Anything: What Traits Are Most Important for Cybersecurity Pros?
By Aravind Thangavelu · November 30, 2022
When I set out to build a team of cybersecurity professionals, I look for certain personality traits and characteristics that I know will lead to success and personal satisfaction for those who choose this career. I look for a certain type of disposition that I've consistently seen in the top-ranking cybersecurity leaders.