In Episode S6E5 of the BSM podcast, we sit down with Ryan Smith, the founder of QFunction, to delve into the transformative power of AI and Machine Learning in cybersecurity. Ryan shares his insights on the pressing challenges businesses face in securing their data amidst the rising tide of cyberattacks […]

AI & ML in Cybersecurity: Enhancing Threat Detection and Cost ...


When policy is not coupled with a well-planned compliance and evaluation program, the agency will likely fail to broadly adopt improved data management practices. Furthermore, if a compliance plan is absent, the agency will be at risk. Failing to ensure compliance with new requirements can call attention to gaps and […]

Good data management policy is a critical foundation for any ...


Businesses can pick from several encryption algorithms when securing their data, systems and communications. To determine which is best, they should compare each based on its type, use cases, strength and speed.  1. Elliptic Curve Cryptography (ECC) ECC is an asymmetric encryption algorithm defined by the equation “y2 = x3 […]

Which Data Encryption Methods Are Best for Your Business?



Cigent Technology, Inc. has launched the Cigent Endpoint Data Protection Platform, an expert-derived solution designed to protect data from ransomware, data exfiltration, and data loss. Developed by exfiltration experts trained in the most demanding environments, the platform provides a comprehensive suite of endpoint data protection services, setting a new standard […]

Enhanced Security and Productivity with Cigent Endpoint Data Protection


In Episode S6E4, Steven Bowcut sits down with Edward Wu, the visionary Founder and CEO of Dropzone AI, to explore how artificial intelligence is transforming the cybersecurity landscape. Summary Edward shares the journey of building Dropzone AI, the first AI SOC analyst that operates autonomously 24/7, integrating seamlessly with existing […]

Revolutionizing Cybersecurity with AI Augmentation


Most cybersecurity teams are under immense pressure to contain threats and recover from attacks as swiftly as possible. Fortunately, if they leverage classification methods, they can relieve some of that strain. How can data classification improve their incident response? What Is Data Classification? Data classification is the practice of organizing […]

How Data Classification Improves Incident Response



On Episode S6E3 of the BSM podcast, host Steven Bowcut delves into the dynamic world of digital safety with Gavin Dunaway, Marketing Director at The Media Trust. This engaging conversation unveils how The Media Trust’s cutting-edge platform safeguards the user experiences across websites and mobile apps, enabling clients to both […]

Securing Digital Spaces: Protect, Comply, and Enhance UX


The latest addition to the Lineaje product portfolio empowers organizations to secure the entire software supply chain, from open-source to proprietary components Lineaje, a leader in continuous software supply chain security management, today unveiled Open-Source Manager (OSM). The comprehensive, first-of-its-kind solution brings transparency to open-source software components in applications and […]

Lineaje Unveils First-of-its-Kind Open-Source Manager to Advance Continuous Software Supply ...


In an era where cyber threats are becoming more sophisticated and widespread, Token has taken a significant step forward by introducing the new Token Ring, equipped with BioTouch Secure™ technology. This innovative product aims to transform the landscape of multi-factor authentication (MFA) by offering a more secure, user-friendly solution that […]

Token Unveils Cutting-Edge MFA Ring to Combat Cyber Threats



When people consider how to keep their information safe, they often focus on passwords, online accounts and keeping computers virus-free. However, one thing the world usually overlooks is mail. The letters and packages that arrive at their doorstep can be a problem for businesses and consumers. Like email addresses, physical […]

Can Mail Be a Cybersecurity Risk?


For Episode S6E2 of the BSM podcast, host Steven Bowcut dives deep with Cynthia Jenkins, CMO and Co-founder of Skillionaire Games by skillsgapp, into the innovative world of mobile gaming designed to bridge the gap between America’s youth and the most in-demand career paths in fields like Advanced Manufacturing, Cyber/IT, […]

Developing a Cybersecurity Workforce Through Gamification


Software-as-a-service (SaaS) sprawl poses a severe security risk to organizations. If their IT and security teams don’t act quickly, they could be subject to data breaches and cyberattacks. How can they secure their workplace against hackers? What Is SaaS Sprawl?  SaaS sprawl is the unchecked growth of the number of […]

How to Manage the Security Risks of SaaS Sprawl