network security

February 15, 2022

SECURITY

NFL Teams Up with Cisco to Secure Super Bowl LVI

In security, preparedness is often the name of the game. That’s why the NFL teamed up with Cisco to secure its Super Bowl LVI network infrastructure.

February 3, 2022

SECURITY

How Exploit Intel Makes You Less Vulnerable

Kenna and the Cyentia Institute's latest research indicates effective risk-based prioritization and risk reduction hinges on exploit intel.

January 26, 2022

SECURITY

How Well-integrated Tech Can Boost Your Organization’s Security

With security teams stretched thin and ever-evolving threats looming, having a well-integrated #security tech stack is a critical step for increasing efficiency and accuracy. But where does your journey towards integration begin? Learn more in Part 2 of our #SecurityOutcomes Study blog series.

January 25, 2022

SECURITY

EXPLORE Security 2022: A Behind the Scenes Look with Cisco at the Security Startup World

Our CISO Advisor team is partnering with Cisco Investments to host EXPLORE Security 2022 on February 23rd, and a chance to meet the companies.

January 14, 2022

SECURITY

There is no substitute for a CISO…or is there?

When CISOs invest time in a Deputy, they have the ability to cover more demands of the role, while preparing their organization for the future.

January 12, 2022

SECURITY

How to drive a successful, proactive tech refresh

Our new #SecurityOutcomes Study, Vol. 2, found that modern, well-integrated IT contributes to overall security program success more than any other practice. Learn more in Part 1 of our #CISO blog series.

January 11, 2022

SECURITY

Top 5 Key Takeaways 2021 CISO Survival Guide

Use these top 5 takeaways from the 2021 CISO Survival Guide to identify relevant emerging trends in the startup space and answer the tough questions about finessing your security strategy.

January 6, 2022

SECURITY

Integrating Perimeter and Internal Defenses: 5 Facts That May or May Not Surprise

Integration is a key aspect of digital transformation, and in the security realm can mean the difference between an intrusion attempt and a data breach. Here are 5 realities when it comes to integrating perimeter and internal defenses.