Yearly Archives: 2023


By Juras Juršėnas, COO at Oxylabs.io When it comes to cybersecurity, organizations are constantly looking for new ways to improve their defenses. A promising area of research is combining cybersecurity with machine learning (ML). This way, organizations can create algorithms that automatically detect potential threats and take steps to mitigate […]

Machine Learning in CyberSec to Find Vulnerabilities and Prevent Attacks


Kindervag will bring his unique expertise in zero trust framework to Traceable AI in their mission to revolutionize API security SAN FRANCISCO, March 14, 2023 — Traceable AI, the industry’s leading API security company, today announced that John Kindervag, known for creating the Zero Trust Model for cybersecurity, will be joining Traceable as an […]

Zero Trust Pioneer John Kindervag Joins Traceable AI as an ...


By Tal Zamir, CTO, Perception Point Enterprise phishing attacks generally start with run-of-the-mill emails believed to come from a trusted source. An employee clicks on an outwardly innocuous link and unwittingly shares sensitive data or responds to seemingly unremarkable requests from someone posing as a company executive – and the […]

Watch Your Head: The Growing Risk of Top-Down Cyber Attacks





By Emily Newton, Editor-in-Chief at Revolutionized Magazine IoT cybersecurity is critical for safety and success in five key industries today. Manufacturing, supply chain, healthcare, energy and transportation businesses face higher than average risk of IoT-related security vulnerabilities. It is crucial for businesses in these industries to be aware of the risks […]

The Top 5 Industries that Need IoT Cybersecurity



By Dimitri Nemirovsky, Atakama Co-founder, and COO Data breach headlines arrive fast and furious, with examples aplenty. The constant assault on companies is well known – the attack surface continues to expand, and sophisticated attacks are becoming more common. So, when state and independent actors continuously change and increase their attack capabilities, […]

From Checkbox to Checkmate: Protecting Critical Data With Multifactor Encryption


As cybersecurity threats become more sophisticated, organizations must employ new measures to protect their networks, digital assets, and data. By understanding and implementing these concepts, you can help reduce your organization’s risk of a cyberattack. In Episode S5E4, cybersecurity expert Bikash Barai, Co-founder of FireCompass, explains how to manage your […]

External Attack Surface Management and Continuous Automated Red Teaming


By Gary Phipps, GRCP, CTPRP, VP Strategy & Business Transformation at CyberGRX There’s no question that we are marching steadily into an increasingly digital future. Nor should it surprise anyone that the vast majority of businesses are prioritizing digital transformation initiatives. Modernization efforts vary based on each company’s goals. However, […]

The Most Common Third-Party Security Gaps Businesses Should Focus On ...



By Idan Wiener, Co-founder and CEO of illustria The world of cybersecurity was rocked by The SolarWinds hack was a significant event as it demonstrated the potential for supply chain attacks to be used to gain access to a wide range of organizations. With these kinds of attacks, hackers target […]

The Next Software Supply Chain Attack Is Imminent, So How ...



IT and security teams can now quickly evaluate endpoint compliance against more than 300 CIS Level 1 Benchmarks, accelerating vulnerability assessment and remediation NEWPORT BEACH, Calif. – February 22, 2023 – Syxsense, a global leader in Unified Security and Endpoint Management (USEM) solutions, today announced Center for Internet Security (CIS) […]

Syxsense First to Combine Endpoint Security Scanning and Remediation for ...