The loneliness of leading a cybersecurity startup

Linor spends her days working with cybersecurity founders at her Venture Capital firm. Gaining insight into their experiences over the course of building these relationships and supporting the brick-laying of their visions, she shares observations on the tough – and often undiscussed –impact their startup journey has on emotional wellness and self-care. The world of […]

Continue Reading

Why encrypting emails isn’t as simple as it sounds

The quality of protected communications matters – a lot. If the sent material is highly sensitive and the legislation and/or policy demands high security, opportunistic encryption might not be enough. For organizations, deciding what email encryption solution to use is often not so simple and, generally speaking, there is no single correct answer. Here we […]

Continue Reading

Maximizing data value while keeping it secure

How can organizations create an environment that allows the broadest access across distributed warehouses, databases, object stores and data exchanges, while at the same time maintaining consistent data oversight? There’s no single template for enacting robust and effective data controls. Still, it’s possible to build a unified data control framework that optimizes data sharing while […]

Continue Reading

How to protect yourself from bot-driven account fraud

Bots continue to evolve and thrive at the expense of companies. Kasada’s research shows revenue loss from bot-driven account fraud and web scraping continues to skyrocket, despite companies spending more on bot mitigation solutions every year. In this Help Net Security video, Nick Rieniets, Field CTO at Kasada, talks about this threat and offers tips […]

Continue Reading

Google is calling EU cybersecurity founders

Google announced that the Google for Startups Growth Academy: Cybersecurity program now accepts applications from EU companies. The three-month program, announced last fall, will start in April and connect the finest of Google with the top European cybersecurity firms. From seed level to Series A, the chosen companies will participate in workshops led by a […]

Continue Reading

4 key shifts in the breach and attack simulation (BAS) market

The increase in the number of attack surfaces along with the rise in cybercriminal sophistication is generating technical debt for security operations centers (SOCs), many of which are understaffed and unable to dedicate time to effectively manage the growing number of security tools in their environment. Yet, regardless of these challenges, SOC teams are tasked […]

Continue Reading