Risk and risk management should be a driving force within IT departments. However, for most enterprises, risk management is considered a…
Read MoreResearch
Key Criteria for Evaluating Governance, Risk, and Compliance (GRC) Solutions
Risk, and risk management, should be a driving force within IT departments. However, for most enterprises, risk management is a tax…
Read MoreGigaOm Radar for Phishing Prevention and Detection
In 2020, global email usage will top 300 billion messages sent, according to technology market research firm The Radicati Group. And…
Read MoreArea 1
We covered Area1 Security in our 2018 Phishing Landscape. The company has continued its upward trajectory and holds a strong position…
Read MoreKey Criteria for Evaluating Phishing Protection Platforms
Phishing is the primary method for breaching businesses. According to a 2018 Verizon Data Breach report, 96% of all attacks begin…
Read MoreZimperium
We covered Zimperium in our December 2018 Landscape Report, and they continue to stand out in their approach and philosophy. Zimperium…
Read MorePublic Key Infrastructure
The role of the CIO has evolved and encompasses more than managing servers, data centers, and the applications that run on…
Read MoreDeception Technology
Deception technology is designed to detect the presence of adversaries on an enterprise network by using decoy systems as bait and…
Read MoreBug Bounty and Penetration Testing
Bug bounties and penetration testing (pen-testing) are powerful techniques that uncover flaws in controls, applications, and hardware. They enable enterprises to…
Read MoreRight Size Security – Episode 5: Bug Bounties
In this episode of Right Size Security, Simon and Steve discuss bug bounties, penetration testing, some of the tools used to…
Listen NowRight Size Security – Episode 4: Advance Behavior Analysis and Threat Detection
In this episode, Simon and Steve discuss what ABA or next-gen SIEMs tell you, how they evolved, and what you need…
Listen NowRight Size Security – Episode 3: Deception Technology
In this episode of Right Size Security, Steve and Simon discussion deception technology. Why do you want it? What are the…
Listen Now