Published inPentester Academy BlogMeta Networks | Access applications anywhereUsers who previously needed to access company systems used to primarily work on-site. If they needed to work off-site, they would use…Jul 3, 2018Jul 3, 2018
Published inPentester Academy BlogLuminate | Secure remote accessAfter realizing the perimeter security landscape was transforming with massive increases in information technology outsourcing, three…Jul 2, 2018Jul 2, 2018
Published inPentester Academy BlogTeramind | Insider threat preventionIt is well known that perhaps the most significant cyber security challenge for organizations of all sizes and verticals is the mistakes…Jun 28, 2018Jun 28, 2018
Published inPentester Academy BlogFyde | Phishing preventionCEO and Co-Founder of Fyde Sinan Eren and his team took notice of the numerous sophisticated phishing attacks launched over the last few…Jun 27, 2018Jun 27, 2018
Published inPentester Academy BlogLastline | Advanced malware detectionSecurity companies are often asked how the threat landscape has changed and they nearly always respond with the same answer, explaining…Jun 21, 2018Jun 21, 2018
Published inPentester Academy BlogSixgill | Dark web cyber intelligenceThe dark web remains an extremely suspicious entity. Many less-technical users are completely unaware of this obscure sector of the…Jun 13, 2018Jun 13, 2018
Published inPentester Academy BlogOstendio | Accessible security managementIn his past experience as a COO and CISO, Grant Elliott spent a considerable amount of time going through various types of audits to…Jun 12, 2018Jun 12, 2018
Published inPentester Academy BlogBaffle | Encryption: The key ingredient for data protectionThe idea that breaches have become a “when” concern as opposed to an “if” concern has become a mainstream theory.Jun 7, 20181Jun 7, 20181
Published inPentester Academy BlogIllusive Networks | Detecting targeted attacks with innovative deceptionOne of the most significant concerns for organizations is the possibility of targeted attacks. Many companies employ a variety of security…Jun 5, 2018Jun 5, 2018
Published inPentester Academy BlogBigstep | Big data, cloud security, and GDPRThe recent installment of the General Data Protection Regulation (GDPR) is dominating conversation in the cyber world. GDPR has created…May 30, 2018May 30, 2018