Tech

Phishing 2.0: Unmasking Modern Cyber Threats and Building Proactive Defences
Phishing has become a cornerstone of cyberattacks in the digital era, evolving into one of the most significant challenges for organizations and individuals alike. The rise of increasingly sophisticated phishing methods has ...

SquareX at Hacker Summer Camp: DEF CON 32 Day 1
Day 1 Recap with Team SquareXEnergized from the rush of Black Hat USA, Team SquareX dove straight into the next phase of Hacker Summer Camp: DEF CON 32. This year, the event was ...

SquareX at Hacker Summer Camp: Black Hat USA 2024 Day 1
Behind the scenes at one of the world’s largest cybersecurity conferencesThe Black Hat USA and DEF CON conferences, both held annually in Las Vegas, are collectively known as “Hacker Summer Camp.” This ...

Navigating Security Awareness in the Tech Industry with Erin Gallagher
In this episode Erin Gallagher, cybersecurity awareness lead at Fastly, discusses her journey into the field of security awareness and her unique approach to enhancing cybersecurity within tech companies. Erin shares her ...

The Cybersecurity Horizon: AI, Resilience and Collaboration in 2024
As we peer into the future, it is imperative to acknowledge the profound impact that artificial intelligence (AI) is having on the cybersecurity arena ...

How DataDome’s Product & Engineering Teams Do More, Faster
A global meetup of 70+ experts from DataDome's engineering & product teams in December 2022 has driven significant impacts on our roadmap & value to customers ...

3 Reasons Women Should Reskill to Work in Cybersecurity
As women, from a young age, being technically savvy or being interested in math, science or business wasn’t celebrated. You were ‘cool’ and ‘popular’ if you had great hair or nice jeans, ...

2022: A Year of Significant QA Transformation at LoginRadius
how we transformed QA to support engineering efforts and deliver a more robust and efficient platform free of production issues for our customers ...

Is Too Much Automation an Issue for Security Operations?
Is Too Much Automation an Issue for Security Operations?Scale, optimization, rapid response, lateral attack propagation, kill chain, and automation all equate to the current model for SecOps when dealing with potential threats ...

The one about identity-first security | Dynamically Speaking
Few have their finger on the pulse of all things Identity and Access Management (IAM) like Jackson Shaw, Chief Strategy Officer for Clear Skye. In our latest Dynamically Speaking interview, hear Jackson’s ...