Prioritization to Prediction: Volume 4: Measuring What Matters in Remediation
This research was commissioned by Kenna Security. Kenna collected and provided the remediation dataset to the Cyentia Institute for independent…
This research was commissioned by Kenna Security. Kenna collected and provided the remediation dataset to the Cyentia Institute for independent…
The idea of identity as the new perimeter for cybersecurity has been part of the conversation for acouple of years.…
Data production, collection, usage, and storage are part of daily life for consumers and organizations engaged in the modern digital…
As head of Product I’m responsible for making sure we have secure software to ship, that our IT Resilience platform…
It’s hard to find a company that isn’t investing in digital transformation in 2020. Particularly in the face of the…
Authentication is a cornerstone capability of any application. Ensuring a user is who they say they are iscrucial to maintaining…
DIGITAL REWARDS COME WITH DIGITAL RISKS It’s a simple choice for businesses: Disrupt or be disrupted Digital technology has transformed…
The vendor landscape for security awareness training (SAT) is as diverse as it is innovative. Thismarket has changed significantly over…
Compromised user credentials are a common attack vector, and can lead to sustained, costly attacks. As an Identity-as-a-service provider (IDaaS),…
Veeam and Conversational Geeks collaborated to publish Conversational Ransomware Defense and Survival, an e-book that illustrates the fundamentals for ransomware preparation,…