PUBLICATION | DATE | ARTICLE |
December 2021 | | |
MarketScreener | 20 | Mimecast : State CIOs Rank Security as No. 1 Priority for 9th Year |
BioMetric Update | 16 | Ping launches authorization, BIO-key updates panel for enterprise IAM |
VentureBeat | 16 | Ory lands $22.5M for zero trust security powered by open source |
GlobeNewswire | 15 | BIO-key Launches Enhanced Admin Panel and User Experience for IT Teams Managing its PortalGuard Identity-as-a-Service (IDaaS) Solution |
GlobeNewswire | 13 | Osterman Research Surveys Show IT & Security Decision-Makers Plan Investments in Multi-Factor Authentication & Zero Trust Solutions to Counter Rising Cyberthreats |
Forbes | 13 | Achieving Cyber Workforce Optimization In 2022 |
Solutions Review | 6 | 32 Experts Share Predictions for Information Security in 2022 |
SCMedia | 6 | The data exfiltration deluge: we’ve lost the battle, but can win the war |
Security Boulevard | 2 | Ransomware pivot 2021: attackers now grab, threaten to leak sensitive data |
November 2021 | | |
VentureBeat | 26 | Report: Zero-trust architecture is expected to increase cybersecurity efficacy by 144% |
Data Center Knowledge | 23 | Trust no one: New technology platforms expand the attack surface |
Security Boulevard | 22 | Shadow Code is a Major Risk for Web Applications |
Cision | 17 | Research: Zero Trust is Expected to Double the Efficacy of Cybersecurity Protections |
SearchSecurity | 15 | 6 reasons unpatched software persists in the enterprise |
RMail | 11 | RMail Humanizes E-Security in RPost’s Year-End Update |
Security Boulevard | 9 | Why you need to rethink your data security strategy and go beyond DLP |
Market Screener | 4 | Government Cybersecurity: Forces Align to Fix K-12 Schools’ Cybersecurity Problem |
Reseller News | 2 | Enterprises with subsidiaries more prone to cyber attacks, study says |
CSO | 1 | Enterprises with subsidiaries more prone to cyberattacks, study says |
October 2021 | | |
Security Boulevard | 25 | Introducing Anti Data Exfiltration (ADX) |
BlackFog | 25 | Anti Data Exfiltration (ADX) remains a top priority for 94% of organizations |
KMWorld | 21 | Managing your most human data source: Microsoft Teams |
JaxEnter | 13 | How To Prepare Your Business For Data Security Risks In The Next Decade? |
HelpNet Security | 13 | Is the government’s response to cybersecurity threats enough for your organization? |
PR Newswire | 12 | Unbound Core Virtualizes Enterprise Cryptographic Orchestration |
Dice | 11 | How Third-Party Code Makes App Development A Cybersecurity Risk |
MarketScreener | 6 | Cybersecurity Awareness Training Results in Greater Employee Engagement |
Search Security | 1 | 6 reasons unpatched software persists in the enterprise |
September 2021 | | |
The Enterprisers Project | 29 | Why DevSecOps fails: 4 signs of trouble |
Health IT Security | 27 | 4 Ways Organizations Can Prevent Healthcare Phishing Attacks |
Formtek | 27 | Security: Reshuffling of Workers during “Great Resignation” Exacerbates Data Leaks |
SCMedia | 23 | The parent company trap: Subsidiaries hide sources of cyber risk |
MSSP Alert | 23 | Enterprises with Multiple Subsidiaries Face Greater Risk of Cyber Attacks |
Yahoo! Finance | 23 | New CyCognito Report Reveals Subsidiaries are Global Enterprise Achilles Heel; Increasing Attack Surface and Exposure Drawing in Attackers |
BollyInside | 22 | PerimeterX Third Annual Analysis Report Reveals False Sense of Security |
Security Magazine | 22 | Shadow Code remains a high security risk |
BusinessWire | 21 | False Sense of Security — Third Annual PerimeterX Report Reveals that Shadow Code Remains a High Risk |
PRWeb | 21 | ActiveNav Launches Data Mapping as a Service to Help Privacy and Compliance Teams Shine a Light on Sensitive Data Hotspots |
Security Boulevard | 20 | A Look Inside the Shadow Code Risk |
BusinessWire | 16 | GrammaTech Selected SINET16 Award Winner |
Market Screener | 15 | Mimecast : Ransomware Drives Demand for Managed Security Services |
Security Intelligence | 10 | How Companies Can Prepare for Botnet Attacks on APIs |
August 2021 | | |
Aerospace Manufacturing and Design | 30 | Open-source software vulnerabilities |
Beta News | 20 | Ensuring compliance takes a front seat when using collaboration tools |
Gulf News | 17 | It is time businesses looked closely at emails as their weakest link |
Security Intelligence | 16 | 5 Ways to Defend Against Supply Chain Cyberattacks |
MeriTalk | 9 | Study Finds Vulnerabilities in COTS Open-Source Components |
Nextgov | 5 | Report Draws Attention to Vulnerabilities in Commercial-Off-the-Shelf Products |
TechNewsWorld | 4 | Study Finds 100% of Commercial Apps Contain Security Flaws |
LinuxInsider | 4 | Study Finds 100% of Commercial Apps Contain Security Flaws |
BusinessWire | 4 | Osterman Research Software Supply Chain Study Finds 100 Percent of Commercial Applications Contain Vulnerable Software Components |
Security Boulevard | 3 | Website Risk Analyzer Finds Threats in Your Third Party Code |
July 2021 | | |
JD Supra | 29 | Does Teams Work Make the Dreams Work? Or Does it Create Information Governance and Compliance Nightmares? |
Security Boulevard | 29 | Elevating Web App Security to a National Priority |
HelpNet Security | 19 | Half of organizations are ineffective at countering phishing and ransomware threats |
Marketing Dive | 15 | Google begins supporting email authentication protocol to guard against phishing |
IDM | 15 | Compliance for Microsoft Teams – Reclaim the Driver’s Seat |
Taiwan News | 13 | 84% of Organizations Experienced Phishing & Ransomware Type Threats in the Past 12 Months |
ITPro | 13 | 84% of Organizations Experienced Phishing or Ransomware Attacks in the Last Year |
ITProToday | 8 | Building an Effective Cybersecurity Culture |
June 2021 | | |
The Register | 25 | ‘What are the odds someone will find and exploit this?’ Nice one — you just released an insecure app |
GlobeNewswire | 23 | PerimeterX Code Defender Named Best Security Solution by the 2021 SIIA CODiE Awards |
HelpNet Security | 3 | It’s time to stop ransomware in its tracks |
May 2021 | | |
CSO Online | 25 | Tailor security training to developers to tackle software supply chain risks |
IDM | 21 | Study Identifies Microsoft Teams Data as Compliance Concern |
GlobeNewswire | 20 | Study Identifies Microsoft Teams Data as a Source of Compliance Concern Among IT Leaders |
E&T | 20 | Was Your Disaster Recovery Plan Ready for a Pandemic? |
HelpNet Security | 19 | Endpoint security: How to shore up practices for a safer remote enterprise |
The Daily Swig | 14 | Shift Right: Developers Knowingly Release Insecure Applications, Says Report |
Security Boulevard | 14 | What the Colonial Pipeline Attack Reminds Us About Phishing and Ransomware |
Security Boulevard | 13 | 81% of Developers at Large Organizations Admit to Knowingly Releasing Vulnerable Applications |
SC Magazine | 13 | Developers knowingly push flawed code, doubt build environments are secure |
April 2021 | | |
Virtualization Review | 16 | Misconfigurations Continue to Plague Cloud Security, New Reports Say |
Digital Journal | 15 | Why Security Awareness Training is a Top Cybersecurity Investment for Business |
Security Boulevard | 13 | Osterman Research: Almost One-Third of US Companies Under-Resourcing Cloud Security Despite Escalating Risks |
SC Media | 1 | Offboarding Tips Will Prevent Employee Data Theft When People Leave the Company |
March 2021 | | |
Security Boulevard | 30 | You Want to Know How to Stop Phishing for Good. Hint: It’s Not a Silver Bullet |
Harvard Business Review | 9 | Cyberattacks Are Inevitable. Is Your Company Prepared? |
February 2021 | | |
Business 2 Community | 17 | What You Need to Know About Remote Employee Monitoring Software |
HelpNet Security | 13 | Employees Aware of Privacy Risks, But Unsure of How They Affect the Workplace |
| | |
January 2021 | | |
Security Boulevard | 28 | App Security Takes a Back Seat in the Drive to Digital Transformation |
Professional Security Magazine Online | 25 | Web Application Security Report |
Business 2 Community | 22 | Employee Offboarding: How to Keep Data Safe During a Termination |
HelpNet Security | 22 | Organizations Struggle to Maintain Application Security Across Platforms |
PR Wire | 21 | Radware research shows API abuse is a leading threat – and enterprises are unprepared for bot traffic |
ContinuityCentral.com | 21 | Will APIs be the gateway to effective cyber attacks in 2021? |
ITProPortal | 21 | Most Security Staff Have Little Say In App Security |
SC Media | 20 | Reliance on cloud, APIs create confusion and introduce risk into software development |
Security Magazine | 20 | API Abuse is a Leading Cyber Threat |
Security Boulevard | 12 | Digital Transformation and the Shadow Code Risk |