Video Interview: Finding Threats within your network – for free
As our quest for the holy grail of cybersecurity continues, we made a discovery which could be helpful for a lot of businesses. Watch our latest video with fletch.ai
Read more...The online magazine for cybersecurity and data protection
As our quest for the holy grail of cybersecurity continues, we made a discovery which could be helpful for a lot of businesses. Watch our latest video with fletch.ai
Read more...SASE, CASB, Zero Trust, SSE – confused yet by all the abbrevations and acryonyms? Cybersecurity ist a highly dynamic field, and even the analysts find it hard to keep up.
We asked Mike Schuricht, VP Products at Forcepoint, to shed some light on Security Service Edge and explains its relationship to SASE and some other cybersecurity abbreviations in this Video Byte.
Cybercriminals go after the little guys, cybersecurity goes after the big guys. See our latest video byte with an interview from Cyfluencer featuring our US editor Lou Covey.
Read more...“Zero Trust” is one of the trending topics in the cybersecurity industry, but does it really exist? Find out in our latest video byte.
Read more...IAM, Zero Trust, Ransomware, IAG, EDPR, XDR – feel lost yet? We spoke with Morten Kjaersgaard, CEO of Heimdal Security, to give us a rundown of the most important topics shaping the cybersecurity industry today.
Read more...With the rise of the Internet of Things there is the need to secure connected devices better.
Cyber Protection Magazine invited renowned experts to discuss IoT Security in a roundtable format.
What is that identity that people always talk about and why does it need protection?
We spoke with two experts on the matter.
With more people working from home, protecting their digital identity is crucial.
We interview Mike Kiser, Senior Identity Strategist at SailPoint, about the ongoing attacks and what companies and individuals can do to protect their digital identities.
In our latest video byte, we’re discussing Cloud Security with Don Boxley, Co-Founder of DH2i – and found an amazing analogy for cloud securit in the process.
Read more...We have already ventured into recording videos in the past, and our YouTube channel shows that this is being recognized. Now, we’re happy to introduce
Read more...