top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


New Report: Inside the High Risk of 3rd-Party SaaS Apps
This guest article was provided by Adaptive Shield Employees are granting third-party apps access to the company’s SaaS apps, especially...
Mar 14, 2023


How Companies Can Can Prevent Multi-Factor Authentication Attacks
Multi-factor authentication (MFA) is an effective way to enhance security by requiring multiple forms of authentication before granting...
Mar 13, 2023


White House Budget Brings Big Fund Increases for Cyber
President Biden's budget plan proposes additional funding for cybersecurity-related spending, including $145 million for the...
Mar 10, 2023


Security Experts Share What the White House National Cyber Strategy Means for Organizations (Part 2)
Read part 1 of this White House National Cyber Strategy expert commentary series here. This week, the White House National Cyber Strategy...
Mar 3, 2023


3 Steps to Reducing False Positives to Zero
This guest post was contributed by Doug Ennis, CEO of Waratek. False positives -- when a security system flags an event as a potential...
Mar 3, 2023


CISA Director Jen Easterly: Make Software Manufacturers Liable for Insecure Products
Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA), has called on Congress to create legislation that...
Mar 2, 2023
bottom of page