Phishing 2.0: Unmasking Modern Cyber Threats and Building Proactive Defences

Phishing 2.0: Unmasking Modern Cyber Threats and Building Proactive Defences

| | Cybersecurity, Phishing, Tech
Phishing has become a cornerstone of cyberattacks in the digital era, evolving into one of the most significant challenges for organizations and individuals alike. The rise of increasingly sophisticated phishing methods has ...
The Birth of DEF CON and Black Hat Hacker Conferences | Jeff Moss | Be Fearless Podcast EP 1

SquareX at Hacker Summer Camp: DEF CON 32 Day 1

Day 1 Recap with Team SquareXEnergized from the rush of Black Hat USA, Team SquareX dove straight into the next phase of Hacker Summer Camp: DEF CON 32. This year, the event was ...
SquareX at Hacker Summer Camp: Black Hat USA 2024 Day 1

SquareX at Hacker Summer Camp: Black Hat USA 2024 Day 1

Behind the scenes at one of the world’s largest cybersecurity conferencesThe Black Hat USA and DEF CON conferences, both held annually in Las Vegas, are collectively known as “Hacker Summer Camp.” This ...
What value do Red Team exercises provide to security awareness programs?

Navigating Security Awareness in the Tech Industry with Erin Gallagher

In this episode Erin Gallagher, cybersecurity awareness lead at Fastly, discusses her journey into the field of security awareness and her unique approach to enhancing cybersecurity within tech companies. Erin shares her ...
zero-trust encrypted AI Trend Micro cybersecurity poverty line, data-centric, SUSE cloud Wiz Torq AirTag Skyhawk SASE security cloud security visibility PwC Survey Finds C-Level Execs Now View Cybersecurity as Biggest Risk

The Cybersecurity Horizon: AI, Resilience and Collaboration in 2024

As we peer into the future, it is imperative to acknowledge the profound impact that artificial intelligence (AI) is having on the cybersecurity arena ...
Security Boulevard
How DataDome’s Product & Engineering Teams Do More, Faster

How DataDome’s Product & Engineering Teams Do More, Faster

A global meetup of 70+ experts from DataDome's engineering & product teams in December 2022 has driven significant impacts on our roadmap & value to customers ...
women, cybersecurity, tech

3 Reasons Women Should Reskill to Work in Cybersecurity

As women, from a young age, being technically savvy or being interested in math, science or business wasn’t celebrated. You were ‘cool’ and ‘popular’ if you had great hair or nice jeans, ...
Security Boulevard
2022: A Year of Significant QA Transformation at LoginRadius

2022: A Year of Significant QA Transformation at LoginRadius

how we transformed QA to support engineering efforts and deliver a more robust and efficient platform free of production issues for our customers ...
Is Too Much Automation an Issue for Security Operations?

Is Too Much Automation an Issue for Security Operations?

Is Too Much Automation an Issue for Security Operations?Scale, optimization, rapid response, lateral attack propagation, kill chain, and automation all equate to the current model for SecOps when dealing with potential threats ...
The one about identity-first security | Dynamically Speaking

The one about identity-first security | Dynamically Speaking

Few have their finger on the pulse of all things Identity and Access Management (IAM) like Jackson Shaw, Chief Strategy Officer for Clear Skye. In our latest Dynamically Speaking interview, hear Jackson’s ...