top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search

Nov 5, 2021
Applying Automation to Rule Recertification
This guest blog was contributed by Ruvi Kitov, CEO and co-founder, Tufin Reviewing firewall rules and ensuring they’re still accurate,...

Nov 1, 2021
Create a Viable Hybrid Security Strategy
This guest blog was contributed by Eyal Arazi, Radware As we enter 2022, it has never been more important to have a viable cloud security...

Oct 29, 2021
Top 3 Microsoft AD Security Horror Stories of 2021
This guest blog was contributed by Andy Robbins, Technical Architect at SpecterOps. At SpecterOps, our experts bring extensive technical...

Sep 8, 2021
A Retailer’s Journey in Protecting Against Web Supply Chain Attacks
This guest blog was contributed by Ronny Ong, Technical Architect at ReadingGlasses.com. From opening our first Reading Glasses boutique...

Aug 9, 2021
Jason Kent, Cequence Security: I Hack Charities
This guest blog was contributed by Jason Kent, Hacker-in-Residence at Cequence Security. Walk through the crowd at BlackHat or DEFCON and...

Aug 4, 2021
3 Password Security Challenges That Threaten the Permanent Hybrid Workforce
This blog was contributed by Darren James, Head of Internal IT at Specops Software. Remote workers are starting to return to their old...
bottom of page