Context: Your Super-Weapon in Vulnerability Management?
Merriam Webster defines context as the interrelated conditions in which something exists or occurs—such as the environment...
Why Modern Enterprises Require Risk-Based Vulnerability Management
Cyberattacks are an increasing concern for organizations in every sector. Complicating the matter is the level of...
Announcing our Series B Funding!
We have some fantastic news to share today — we’ve raised $20 million in our Series B round! Singtel Innov8, the corporate...
What is an iSOC?
Earlier today Tech Mahindra (TechM), a leading global provider of consulting services and solutions announced a strategic...
Part 3: Beyond the Hype: AI, ML, and Deep Learning in Cybersecurity
This is the final piece of my three part blog on the topic of human intelligence vs AI, and how AI is being used...
Part 2: Beyond the Hype: AI, ML, and Deep Learning in Cybersecurity
This is the second piece of my three part blog on the topic of the nature of human intelligence vs AI, understanding the...
Beyond the Hype: AI, ML, and Deep Learning in Cybersecurity
Recently, I participated in a thought leadership discussion moderated by Izak Mutlu, former CISO of Salesforce, and Gamiel...
The Deloitte Breach: Any New Takeaways?
Another breach, this time of a top cyber-advisory firm, Deloitte. So the Equifax breach was about the company’s culture, and...
What should Tim Cook, Satya Nadella, Sundar Pichai and you do differently after the Equifax breach?
In recent days, there have been a lot of coverage of the Equifax breach. There is criticism on how Equifax is handling the...
What is cyber-resilience?
If you are a CxO, Board Member, or in the cyber-security business, you have probably seen the word cyber-resilience popping...