Prediction: The Growing Importance of API Security
API security is one of those topics which don’t gather too much attention. This year, however, might be the year where API security will get the attention it deserves.
Read more...API security is one of those topics which don’t gather too much attention. This year, however, might be the year where API security will get the attention it deserves.
Read more...In our thrid episode with Matt Donato we look at the candidate experience in the hiring process; where it goes right and where it goes wrong.
Read more...t two of our video series with Matt Donato, managing director of #cybersecurity hiring company CyberSN, looks at strategies for discovering and communicating the actual personnel need for a company.
Read more...Our next video byte is up, discussing endpoint protection. That still sounds a lot like “Anti-Virus“ doesn’t it? But endpoint protection has come a long way from „only“ scanning for malicious software.
Read more...SASE, CASB, Zero Trust, SSE – confused yet by all the abbrevations and acryonyms? Cybersecurity ist a highly dynamic field, and even the analysts find it hard to keep up.
We asked Mike Schuricht, VP Products at Forcepoint, to shed some light on Security Service Edge and explains its relationship to SASE and some other cybersecurity abbreviations in this Video Byte.
Cybercriminals go after the little guys, cybersecurity goes after the big guys. See our latest video byte with an interview from Cyfluencer featuring our US editor Lou Covey.
Read more...“Zero Trust” is one of the trending topics in the cybersecurity industry, but does it really exist? Find out in our latest video byte.
Read more...In this video byte we discuss a strategy to fight ransomware which might not be that obvious: a good backup strategy.
Read more...What is that identity that people always talk about and why does it need protection?
We spoke with two experts on the matter.
Looking at some of the recent cybersecurity headlines , there is a lot of talk on ransomware. Apparently, ransomware is by far the most “popular” form of attack.
We wondered why this is and asked Gijsbert Janssen to give us a heads-up.