VentureBeat columns
At VentureBeat, my areas of coverage include the latest developments in how AI is improving cybersecurity, endpoint security, and ransomware detection across the enterprise landscape. Below is a list of my published columns:
- How Anthropic’s Claude cuts SOC investigation time from 5 hours to 7 minutes
Integrating AI models directly into extended detection and response (XDR) platforms delivers breakthrough SOC investigation speed and accuracy.
URL: https://venturebeat.com/security/anthropic-claude-soc-investigation-time - Agentic AI security breaches are coming: 7 ways to make sure it’s not your firm
Seven battle-tested strategies leaders trust to stay ahead of agentic AI security risks.
URL: https://venturebeat.com/security/agentic-ai-security-breaches-prevention - Cisco warns enterprises: Without tapping machine data, your AI strategy is incomplete
Cisco asserts the distinction between model companies and product companies is disappearing in enterprise AI.
URL: https://venturebeat.com/ai/cisco-machine-data-ai-strategy - Why identity-first security is the first defense against sophisticated AI attacks
Enterprise security faces an identity crisis as attackers focus on identity compromise and social engineering.
URL: https://venturebeat.com/security/identity-first-security-ai-attacks - CrowdStrike bets on agentic workforces to outpace AI-driven adversaries
CrowdStrike’s approach for using agentic AI to stay ahead of AI-powered cyber threats.
URL: https://venturebeat.com/security/crowdstrike-agentic-workforces-ai-adversaries - Software commands 40% of cybersecurity budgets as gen AI attacks execute in milliseconds
Software spending now makes up 40% of cybersecurity budgets as CISOs prioritize real-time AI defenses.
URL: https://venturebeat.com/security/software-cybersecurity-budgets-gen-ai-attacks - The end of perimeter defense: When your own AI tools become the threat actor
Russia’s APT28 tested LLM-powered malware on Ukraine; the same tech is now selling for $250/month on the dark web.
URL: https://venturebeat.com/security/end-perimeter-defense-ai-tools-threat-actor - Black Hat 2025: Why your AI tools are becoming the next insider threat
Black Hat 2025 delivered performance metrics from beta agentic AI programs, proving real results beyond hype.
URL: https://venturebeat.com/security/black-hat-2025-ai-tools-insider-threat - Crowdstrike’s massive cyber outage 1-year later: lessons enterprises can learn to improve security
The incident’s legacy drives staged rollouts and manual override adoption across enterprises.
URL: https://venturebeat.com/security/crowdstrike-outage-one-year-later-lessons - Red team AI now to build safer, smarter models tomorrow
Traditional AI defenses are failing; red teaming is crucial for thwarting adversarial threats.
URL: https://venturebeat.com/ai/red-team-ai-safer-smarter-models - The five security principles driving open source security apps at scale
Open-source AI breaks barriers and consistently delivers results for cybersecurity innovation.
URL: https://venturebeat.com/security/five-security-principles-open-source-apps - Securing AI at scale: Databricks and Noma close the inference security gap
Databricks Ventures and Noma Security partner on real-time threat analytics for critical AI vulnerabilities.
URL: https://venturebeat.com/ai/databricks-noma-securing-ai-scale - Meta, Cisco put open-source LLMs at the core of next-gen SOC workflows
Cisco’s Foundation-sec-8B LLM & Meta’s AI Defenders redefine scalable SOC operations with open-source AI.
URL: https://venturebeat.com/ai/rsac-2025-cisco-meta-open-source-llms-soc - RSAC 2025: Why the AI agent era means more demand for CISOs
AI agents enter security workflows — but boards want evidence these models deliver results.
URL: https://venturebeat.com/security/rsac-2025-ai-agent-era-cisos - Building resilience with AI threat modeling: Lessons from the Rate Companies
AI threat modeling helps CISOs redefine zero trust and combat identity-based attacks in 2025.
URL: https://venturebeat.com/security/ai-threat-modeling-rate-companies
2024
- Forrester on cybersecurity budgeting: 2025 will be the year of CISO accountability
With 90% of leaders predicting budget increases for 2025, CISOs face a new era of accountability.
URL: https://venturebeat.com/security/forrester-cybersecurity-budgeting-2025-ciso-accountability - Identity management in 2025: 4 ways security teams can address gaps and risks
The majority of businesses (90%) faced identity-related intrusion or breach attempts in the past year.
URL: https://venturebeat.com/security/identity-management-2025-security-teams - Select Deepfakes will cost $40 billion by 2027 as adversarial AI gains momentum
Exploring the rising financial impact of deepfakes driven by adversarial AI by 2027.
URL: https://venturebeat.com/article/deepfakes-will-cost-40-billion-by-2027 - How adversarial AI is creating shallow trust in deepfake world
Analysis of how adversarial AI is eroding trust in digital content through deepfakes.
URL: https://venturebeat.com/article/adversarial-ai-shallow-trust-in-deepfake-world - How Anthropic’s comprehensive red team methods close AI security gaps
Discussing Anthropic’s red team strategies to enhance AI security.
URL: https://venturebeat.com/article/anthropic-red-team-methods-ai-security-gaps - Select How AI and LLMs are revolutionizing cyber insurance
Examination of how AI and large language models (LLMs) are transforming cyber insurance.
URL: https://venturebeat.com/article/ai-llms-revolutionizing-cyber-insurance - How AI-driven identity attacks are defining the new threatscape
An insight into how AI is driving new types of identity attacks.
URL: https://venturebeat.com/article/ai-driven-identity-attacks-threatscape - Select Snowflake’s customer breaches make 2024 the year of the identity siege
Analysis of how Snowflake’s breaches highlight the critical importance of identity security in 2024.
URL: https://venturebeat.com/article/snowflake-customer-breaches-2024 - Select Deepfakes will cost $40 billion by 2027 as adversarial AI gains momentum
Exploring the rising financial impact of deepfakes driven by adversarial AI by 2027.
URL: https://venturebeat.com/article/deepfakes-will-cost-40-billion-by-2027 - How adversarial AI is creating shallow trust in deepfake world
Analysis of how adversarial AI is eroding trust in digital content through deepfakes.
URL: https://venturebeat.com/article/adversarial-ai-shallow-trust-in-deepfake-world - How Anthropic’s comprehensive red team methods close AI security gaps
Discussing Anthropic’s red team strategies to enhance AI security.
URL: https://venturebeat.com/article/anthropic-red-team-methods-ai-security-gaps - Select How AI and LLMs are revolutionizing cyber insurance
Examination of how AI and large language models (LLMs) are transforming cyber insurance.
URL: https://venturebeat.com/article/ai-llms-revolutionizing-cyber-insurance - How AI-driven identity attacks are defining the new threatscape
An insight into how AI is driving new types of identity attacks.
URL: https://venturebeat.com/article/ai-driven-identity-attacks-threatscape - Select Snowflake’s customer breaches make 2024 the year of the identity siege
Analysis of how Snowflake’s breaches highlight the critical importance of identity security in 2024.
URL: https://venturebeat.com/article/snowflake-customer-breaches-2024 - Why cellular-first SASE is defining the future of distributed enterprises
Discussing the role of cellular-first Secure Access Service Edge (SASE) in the future of distributed enterprises.
URL: https://venturebeat.com/article/cellular-first-sase-distributed-enterprises - RSAC 2024 reveals the impact AI is having on strengthening cybersecurity infrastructure
Insights from RSAC 2024 on how AI is enhancing cybersecurity infrastructure.
URL: https://venturebeat.com/article/rsac-2024-ai-cybersecurity-infrastructure - Select CrowdStrike launches advanced SIEM to power the AI-native SOC at RSAC 2024
Details on CrowdStrike’s new advanced Security Information and Event Management (SIEM) system introduced at RSAC 2024.
URL: https://venturebeat.com/article/crowdstrike-advanced-siem-ai-native-soc-rsac-2024 - Cisco reimagines cybersecurity at RSAC 2024 with AI and kernel-level visibility
Cisco’s new approaches to cybersecurity involving AI and kernel-level visibility as showcased at RSAC 2024.
URL: https://venturebeat.com/article/cisco-cybersecurity-rsac-2024-ai-kernel-visibility - How VISA is using generative AI to battle account fraud attacks
Explanation of VISA’s use of generative AI to combat account fraud.
URL: https://venturebeat.com/article/visa-generative-ai-account-fraud-attacks - Forrester’s top 5 cybersecurity threats for 2024: Weaponized AI is the new normal
Forrester’s identification of the top cybersecurity threats for 2024, emphasizing weaponized AI.
URL: https://venturebeat.com/article/forrester-2024-cybersecurity-threats-weaponized-ai - Palo Alto Networks’ CTO on why machine learning is revolutionizing SOC performance
Interview with Palo Alto Networks’ CTO about the impact of machine learning on Security Operations Center (SOC) performance.
URL: https://venturebeat.com/article/palo-alto-networks-cto-machine-learning-soc-performance - Why LLMs are predicting the future of compliance and risk management
Exploration of how large language models (LLMs) are influencing compliance and risk management predictions.
URL: https://venturebeat.com/article/llms-compliance-risk-management - Select Platform versus Platformization: How CrowdStrike is winning the platform battle
Analysis of CrowdStrike’s strategy in the platform versus platformization battle.
URL: https://venturebeat.com/article/platform-vs-platformization-crowdstrike - Platform versus Platformization: George Kurtz on why CrowdStrike is winning the platform battle
George Kurtz’s insights into CrowdStrike’s success in the platform battle.
URL: https://venturebeat.com/article/george-kurtz-crowdstrike-platform-battle - Telesign’s Verify API goes all in with AI and ML to secure omnichannel growth
Details on how Telesign’s Verify API leverages AI and machine learning for omnichannel security.
URL: https://venturebeat.com/article/telesign-verify-api-ai-ml-omnichannel-growth - Key takeaways from Forrester’s Top Trends in IoT Security 2024
Summarizing the main points from Forrester’s report on top trends in IoT security for 2024.
URL: https://venturebeat.com/article/forrester-2024-iot-security-trends - Defending against IoT ransomware attacks in a zero-trust world
Strategies for protecting against IoT ransomware attacks using zero-trust principles.
URL: https://venturebeat.com/article/defending-iot-ransomware-attacks-zero-trust - Hacking internal AI chatbots with ASCII art is a security team’s worst nightmare
Exploring the vulnerabilities of internal AI chatbots to ASCII art attacks.
URL: https://venturebeat.com/article/hacking-ai-chatbots-ascii-art - Zscaler finds enterprise AI adoption soars 600% in less than a year, putting data at risk
Report on the rapid increase in enterprise AI adoption and the associated data risks.
URL: https://venturebeat.com/article/zscaler-enterprise-ai-adoption-data-risk - Security expert Chris Krebs on TikTok, AI and the key to survival (part 2)
Second part of an interview with Chris Krebs discussing TikTok, AI, and cybersecurity strategies.
URL: https://venturebeat.com/article/chris-krebs-tiktok-ai-survival-part-2 - Why adversarial AI is the cyber threat no one sees coming
Analysis of the overlooked dangers posed by adversarial AI in cybersecurity.
URL: https://venturebeat.com/article/adversarial-ai-cyber-threat - CIOs share how they are harnessing gen AI’s potential at Nvidia GTC
Insights from CIOs on leveraging generative AI shared at Nvidia’s GTC conference.
URL: https://venturebeat.com/article/cios-harnessing-gen-ai-nvidia-gtc - Security expert Chris Krebs on TikTok, AI and the key to survival
First part of an interview with Chris Krebs discussing TikTok, AI, and cybersecurity strategies.
URL: https://venturebeat.com/article/chris-krebs-tiktok-ai-survival - United Healthcare’s ransomware attack shows why supply chains are under siege
Examination of a ransomware attack on United Healthcare and its implications for supply chain security.
URL: https://venturebeat.com/article/united-healthcare-ransomware-supply-chains - CrowdStrike and Dell unleash an AI-powered, unified security vision
Details on the collaboration between CrowdStrike and Dell to develop an AI-driven unified security solution.
URL: https://venturebeat.com/article/crowdstrike-dell-ai-unified-security - Five ways AI is helping to reduce supply chain attacks on DevOps teams
Exploring how AI technologies are mitigating supply chain attacks targeting DevOps teams.
URL: https://venturebeat.com/article/ai-reducing-supply-chain-attacks-devops - How open source is disrupting enterprise security: Startup Filigran shows the way with collaborative threat defense
Discussing how Filigran is using open-source methods for collaborative threat defense in enterprise security.
URL: https://venturebeat.com/article/open-source-disrupting-enterprise-security-filigran - VCs look to AI data centers, local LLMs, and domain models for growth
Insights into venture capital trends focusing on AI data centers, local language models, and domain-specific models.
URL: https://venturebeat.com/article/vcs-ai-data-centers-llms-domain-models - The five most alarming cyber threats from CrowdStrike’s 2024 Global Threat Report
Highlighting the top five cyber threats identified in CrowdStrike’s 2024 report.
URL: https://venturebeat.com/article/crowdstrike-2024-global-threat-report - How AI is strengthening XDR to consolidate tech stacks
Examination of how AI is enhancing Extended Detection and Response (XDR) to streamline tech stacks.
URL: https://venturebeat.com/article/ai-strengthening-xdr-tech-stacks - Eight emerging areas of opportunity for AI in security
Identifying eight new opportunities for AI applications in the security sector.
URL: https://venturebeat.com/article/emerging-ai-opportunities-security - Menlo Ventures’ vision for the future of security for AI
Menlo Ventures’ perspective on the future of AI in security.
URL: https://venturebeat.com/article/menlo-ventures-future-security-ai - How audio-jacking using gen AI can distort live audio transactions
Discussing the threat of audio-jacking attacks using generative AI to manipulate live audio.
URL: https://venturebeat.com/article/audio-jacking-gen-ai-live-audio - Why AI and behavioral analytics are stealth strengths of Gartner’s MQ on endpoints
Exploring how AI and behavioral analytics are key strengths in Gartner’s Magic Quadrant for endpoint protection.
URL: https://venturebeat.com/article/ai-behavioral-analytics-gartner-mq-endpoints - 10 reasons why securing software supply chains needs to start with containers
Explaining why container security is crucial for protecting software supply chains.
URL: https://venturebeat.com/article/securing-software-supply-chains-containers - The future of biometrics in a zero trust world
Looking at the role of biometrics in enhancing zero trust security frameworks.
URL: https://venturebeat.com/article/future-biometrics-zero-trust - WEF 2024 Report: Cybersecurity at the forefront, zero trust seen as critical for trust rebuilding
Highlights from the World Economic Forum’s 2024 report on cybersecurity and zero trust.
URL: https://venturebeat.com/article/wef-2024-cybersecurity-zero-trust - How enterprises are using gen AI to protect against ChatGPT leaks
Describing how companies are leveraging generative AI to safeguard against leaks from AI systems like ChatGPT.
URL: https://venturebeat.com/article/enterprises-gen-ai-chatgpt-leaks - Job hunter’s guide to the top cybersecurity companies hiring in 2024
A guide for job seekers on the leading cybersecurity firms to consider for employment in 2024.
URL: https://venturebeat.com/article/job-hunters-guide-top-cybersecurity-companies-2024
2023
- Why training LLMs with endpoint data will strengthen cybersecurity
Discussing how training large language models with endpoint data can enhance cybersecurity.
URL: https://venturebeat.com/article/training-llms-endpoint-data-cybersecurity - Why attackers love to target misconfigured clouds and phones
Analysis of why cyber attackers focus on misconfigured cloud services and mobile devices.
URL: https://venturebeat.com/article/attackers-target-misconfigured-clouds-phones - 16 Cybersecurity leaders predict how gen AI will improve cybersecurity in 2024
Predictions from 16 cybersecurity experts on the impact of generative AI on cybersecurity in 2024.
URL: https://venturebeat.com/article/cybersecurity-leaders-gen-ai-2024 - IBM’s 2024 predictions show gen AI is the new DNA of cyberattacks
IBM’s forecast on how generative AI will become integral to future cyberattacks.
URL: https://venturebeat.com/article/ibm-2024-predictions-gen-ai-cyberattacks - How to protect unmanaged devices in today’s zero-trust world
Strategies for securing unmanaged devices within a zero-trust framework.
URL: https://venturebeat.com/article/protect-unmanaged-devices-zero-trust - The age of weaponized LLMs is here
Examining the emergence and threats of weaponized large language models.
URL: https://venturebeat.com/article/weaponized-llms - How ConductorOne’s Copilot improves identity governance with AI
Overview of ConductorOne’s Copilot tool and its use of AI for identity governance.
URL: https://venturebeat.com/article/conductorone-copilot-identity-governance-ai - Meta champions a new era in safe gen AI with Purple Llama
Meta’s initiatives to promote safe generative AI through its Purple Llama project.
URL: https://venturebeat.com/article/meta-purple-llama-safe-gen-ai - Mine’s $30M boost will bring AI-based privacy to the enterprise
How Mine plans to use its new funding to advance AI-driven privacy solutions for businesses.
URL: https://venturebeat.com/article/mine-30m-ai-privacy-enterprise - Cisco goes all in on AI to strengthen its cybersecurity strategy
Cisco’s comprehensive approach to integrating AI into its cybersecurity strategy.
URL: https://venturebeat.com/article/cisco-ai-cybersecurity-strategy - How Arnica’s CEO foresees generative AI’s impact on DevOps security
Insights from Arnica’s CEO on how generative AI will influence DevOps security practices.
URL: https://venturebeat.com/article/arnica-ceo-generative-ai-devops-security - Hugging Face dodged a cyber-bullet with Lasso Security’s help
Case study on how Hugging Face avoided a major security breach with Lasso Security’s assistance.
URL: https://venturebeat.com/article/hugging-face-lasso-security - How generative AI will enhance cybersecurity in a zero-trust world
Discussing the benefits of generative AI for strengthening zero-trust cybersecurity models.
URL: https://venturebeat.com/article/generative-ai-zero-trust-cybersecurity - 2024: The Year Microsoft’s AI-Driven Zero Trust Vision Delivers
Predictions on how Microsoft’s AI-driven zero-trust strategies will come to fruition in 2024.
URL: https://venturebeat.com/article/microsoft-ai-zero-trust-2024 - OpenAI’s leadership drama underscores why its GPT model security needs fixing
Analysis of leadership issues at OpenAI and the implications for GPT model security.
URL: https://venturebeat.com/article/openai-leadership-gpt-model-security - Microsoft goes all-in on Gen AI with security copilot and Defender XDR
Overview of Microsoft’s latest generative AI initiatives, including the security copilot and Defender XDR.
URL: https://venturebeat.com/article/microsoft-gen-ai-security-copilot-defender-xdr - How generative AI is defining the future of identity access management
Exploring how generative AI technologies are shaping identity access management (IAM).
URL: https://venturebeat.com/article/generative-ai-identity-access-management - Forrester predicts A.I. code flaws will enable new attacks next year
Forrester’s predictions on how flaws in AI code will lead to new cyberattacks in the coming year.
URL: https://venturebeat.com/article/forrester-ai-code-flaws-new-attacks - Vanta report: AI-powered trust management will help close security compliance gaps
Findings from Vanta’s report on the role of AI in enhancing trust management and closing compliance gaps.
URL: https://venturebeat.com/article/vanta-ai-trust-management-security-compliance - PayPal’s CISO on how generative AI can improve cybersecurity
An interview with PayPal’s CISO discussing the potential of generative AI in cybersecurity.
URL: https://venturebeat.com/article/paypal-ciso-generative-ai-cybersecurity - Endpoint security getting a boost from AI and machine learning
How AI and machine learning are enhancing endpoint security measures.
URL: https://venturebeat.com/article/ai-machine-learning-endpoint-security - New defense tools from Abnormal Security defend against seemingly harmless QR codes
Abnormal Security’s new tools designed to protect against threats posed by QR codes.
URL: https://venturebeat.com/article/abnormal-security-defense-tools-qr-codes - Las Vegas CIO doubles down on AI and endpoint security to protect Sin City
How the CIO of Las Vegas is using AI and endpoint security to safeguard the city.
URL: https://venturebeat.com/article/las-vegas-cio-ai-endpoint-security - Surviving a ransomware attack begins by acknowledging it’s inevitable
Strategies for surviving ransomware attacks by accepting their inevitability.
URL: https://venturebeat.com/article/surviving-ransomware-attack-inevitable - Okta’s breach shows why identities come first in a zero trust world
Analysis of Okta’s security breach and the importance of identity in zero-trust security.
URL: https://venturebeat.com/article/okta-breach-zero-trust-identities - Microsoft’s AI strategy is paying off with solid cloud revenue growth
Overview of Microsoft’s successful AI strategy and its impact on cloud revenue growth.
URL: https://venturebeat.com/article/microsoft-ai-strategy-cloud-revenue - Why GPT-4 is vulnerable to multimodal prompt injection image attacks
Exploring the vulnerabilities of GPT-4 to multimodal prompt injection attacks using images.
URL: https://venturebeat.com/article/gpt-4-vulnerable-multimodal-prompt-injection - The cyber risks of overheating data centers
Discussing the cybersecurity risks associated with overheating data centers.
URL: https://venturebeat.com/article/cyber-risks-overheating-data-centers - Securing generative AI starts with sustainable data centers
How securing generative AI technologies begins with the development of sustainable data centers.
URL: https://venturebeat.com/article/securing-generative-ai-sustainable-data-centers - How AI can help close IoT’s growing security gaps to contain ransomware
Examining how AI can mitigate IoT security vulnerabilities to prevent ransomware attacks.
URL: https://venturebeat.com/article/ai-iot-security-ransomware - Gutsy gains $51M seed round, one of cybersecurity’s largest this year
Details on Gutsy’s significant seed funding and its implications for cybersecurity.
URL: https://venturebeat.com/article/gutsy-51m-seed-round-cybersecurity - Vanta continues to revolutionize trust management with latest AI release
How Vanta’s new AI release is transforming trust management practices.
URL: https://venturebeat.com/article/vanta-trust-management-ai-release - How AI-powered patch management protects remote and hybrid workers
The role of AI in enhancing patch management to secure remote and hybrid work environments.
URL: https://venturebeat.com/article/ai-powered-patch-management-remote-hybrid - Building more cyber-resilient satellites begins with a strong network
Discussing the importance of robust networks in creating cyber-resilient satellites.
URL: https://venturebeat.com/article/cyber-resilient-satellites-strong-network - E-commerce fraud to cost $48 billion globally this year as attacks skyrocket, report says
Analysis of the dramatic increase in e-commerce fraud and its projected financial impact.
URL: https://venturebeat.com/article/e-commerce-fraud-global-cost - AI needs human insight to reach its full potential against cyberattacks
How integrating human insight with AI can enhance its effectiveness in combating cyberattacks.
URL: https://venturebeat.com/article/ai-human-insight-cyberattacks - Why Cradlepoint’s acquisition of Ericom predicts the future of SASE in the enterprise
Examining how Cradlepoint’s acquisition of Ericom forecasts trends in Secure Access Service Edge (SASE) within enterprises.
URL: https://venturebeat.com/article/cradlepoint-ericom-sase-enterprise - CrowdStrike defines a strong vision for generative AI at Fal.Con 2023
Insights from CrowdStrike’s presentation on generative AI at the Fal.Con 2023 conference.
URL: https://venturebeat.com/article/crowdstrike-generative-ai-falcon-2023 - Why CISOs need zero trust as a ransomware shield
Discussing the necessity of zero-trust frameworks for protecting against ransomware attacks.
URL: https://venturebeat.com/article/cisos-zero-trust-ransomware-shield - Protecting ML models will secure supply chain, JFrog releases ML security features
How securing machine learning models can safeguard supply chains, with a focus on JFrog’s new security features.
URL: https://venturebeat.com/article/protecting-ml-models-supply-chain-jfrog - Five ways CISOs are using AI to protect their employees’ digital devices and identities
Examples of how Chief Information Security Officers (CISOs) are leveraging AI for device and identity protection.
URL: https://venturebeat.com/article/cisos-ai-protect-digital-devices-identities - Visa’s report makes a case for outsmarting payment fraud with AI now
Summary of Visa’s report advocating for the use of AI to combat payment fraud.
URL: https://venturebeat.com/article/visa-report-outsmarting-payment-fraud-ai - 5 ways CISOs can prepare for generative AI’s security challenges and opportunities
Strategies for CISOs to address the security challenges and opportunities presented by generative AI.
URL: https://venturebeat.com/article/cisos-generative-ai-security - Quantum threats loom in Gartner’s 2023 Hype Cycle for data security
Overview of Gartner’s 2023 Hype Cycle report highlighting the emerging quantum threats to data security.
URL: https://venturebeat.com/article/gartner-2023-hype-cycle-quantum-threats - Honeywell’s acquisition of cybersecurity provider sets sights on manufacturing sector’s deep IoT vulnerabilities
Analysis of Honeywell’s acquisition aimed at addressing IoT vulnerabilities in the manufacturing sector.
URL: https://venturebeat.com/article/honeywell-acquisition-iot-vulnerabilities-manufacturing - Nvidia reports record Q2 results driven by surging data center demand
Report on Nvidia’s record-breaking Q2 financial results fueled by high demand for data centers.
URL: https://venturebeat.com/article/nvidia-q2-results-data-center-demand - How AI brings greater accuracy, speed, and scale to microsegmentation
Discussing how AI enhances the effectiveness of microsegmentation in cybersecurity.
URL: https://venturebeat.com/article/ai-microsegmentation-accuracy-speed-scale - Less noise, better signals: Why XDR and AI are the future of cybersecurity
Exploring the benefits of Extended Detection and Response (XDR) and AI in reducing cybersecurity noise.
URL: https://venturebeat.com/article/xdr-ai-future-cybersecurity - Top 20 cloud native application protection platforms of 2023
A list of the top 20 platforms for protecting cloud-native applications in 2023.
URL: https://venturebeat.com/article/top-20-cloud-native-application-protection-platforms-2023 - How FraudGPT presages the future of weaponized AI
Analysis of FraudGPT and its implications for the future of weaponized AI.
URL: https://venturebeat.com/article/fraudgpt-future-weaponized-ai - Cybersecurity startup ConductorOne grows series A funding to $27M to boost least privilege access
Report on ConductorOne’s successful Series A funding round aimed at enhancing least privilege access.
URL: https://venturebeat.com/article/conductorone-series-a-funding-least-privilege-access - Protecting data in the era of generative AI: Nightfall AI launches innovative security platform
Overview of Nightfall AI’s new platform designed to protect data in the age of generative AI.
URL: https://venturebeat.com/article/nightfall-ai-security-platform-generative-ai - Why cybersecurity vendors are selling tech stack consolidation with Zero Trust Edge
Discussing the trend of cybersecurity vendors promoting tech stack consolidation through Zero Trust Edge solutions.
URL: https://venturebeat.com/article/cybersecurity-vendors-tech-stack-consolidation-zero-trust-edge - IBM study reveals how AI, automation protect enterprises against data breaches
Insights from IBM’s study on the role of AI and automation in preventing data breaches.
URL: https://venturebeat.com/article/ibm-study-ai-automation-data-breaches - The top 10 technologies defining the future of cybersecurity
A list of the top 10 technologies expected to shape the future of cybersecurity.
URL: https://venturebeat.com/article/top-10-technologies-future-cybersecurity - Maximizing data center performance by getting cloud migration right
Tips for optimizing data center performance through effective cloud migration strategies.
URL: https://venturebeat.com/article/maximizing-data-center-performance-cloud-migration - Designing for safety: 10 cybersecurity priorities for a zero-trust data center
Identifying key cybersecurity priorities for designing a secure zero-trust data center.
URL: https://venturebeat.com/article/10-cybersecurity-priorities-zero-trust-data-center - How AI can improve the future of incident response
Exploring how AI technologies can enhance incident response capabilities.
URL: https://venturebeat.com/article/ai-improve-incident-response - How FedEx Dataworks is using analytics, AI to fortify supply chains
Case study on FedEx Dataworks’ use of analytics and AI to strengthen supply chain security.
URL: https://venturebeat.com/article/fedex-dataworks-analytics-ai-supply-chains - How Walmart’s Emerging Tech team is transforming retail with conversational AI
Overview of Walmart’s use of conversational AI to innovate in the retail sector.
URL: https://venturebeat.com/article/walmart-emerging-tech-conversational-ai - Network, IAM and cloud are the top 3 cybersecurity spending priorities for 2023
Identifying the primary cybersecurity spending priorities for 2023: network, identity access management (IAM), and cloud security.
URL: https://venturebeat.com/article/cybersecurity-spending-priorities-2023 - 10 ways SecOps can strengthen cybersecurity with ChatGPT
Tips on how Security Operations (SecOps) teams can leverage ChatGPT to enhance cybersecurity.
URL: https://venturebeat.com/article/10-ways-secops-strengthen-cybersecurity-chatgpt - Why healthcare in the cloud must move to zero trust cybersecurity
Discussing the necessity for the healthcare industry to adopt zero trust cybersecurity measures in the cloud.
URL: https://venturebeat.com/article/healthcare-cloud-zero-trust-cybersecurity - 10 things every CISO needs to know about identity and access management (IAM)
Key insights and best practices for Chief Information Security Officers (CISOs) regarding identity and access management (IAM).
URL: https://venturebeat.com/article/ciso-identity-access-management-iam - 5 ways generative AI will help bring greater precision to cybersecurity
Exploring five ways generative AI can enhance the precision and effectiveness of cybersecurity measures.
URL: https://venturebeat.com/article/5-ways-generative-ai-precision-cybersecurity - Cloud security leader Zscaler bets on generative AI as future of zero trust
Discussing Zscaler’s strategic focus on generative AI to advance zero trust security.
URL: https://venturebeat.com/article/zscaler-generative-ai-zero-trust - MIT-based AI apps startup aims to block supply chain attacks with advanced cybersecurity
Overview of a MIT-based startup developing AI applications to prevent supply chain cyberattacks.
URL: https://venturebeat.com/article/mit-ai-startup-supply-chain-attacks - The Future of Software: Building Products with Privacy at the Core
Discussing the importance of integrating privacy into the core of software product development.
URL: https://venturebeat.com/article/future-software-privacy-core - Top 10 cybersecurity findings from Verizon’s 2023 data breach report
Summary of the key findings from Verizon’s 2023 data breach investigation report.
URL: https://venturebeat.com/article/verizon-2023-data-breach-report - Why attackers love to target IoT devices
An analysis of why Internet of Things (IoT) devices are attractive targets for cyber attackers.
URL: https://venturebeat.com/article/attackers-target-iot-devices - VentureBeat Q&A: CrowdStrike’s Michael Sentonas on importance of unifying endpoint and identity security
Interview with Michael Sentonas of CrowdStrike on the critical role of unifying endpoint and identity security.
URL: https://venturebeat.com/article/crowdstrike-michael-sentonas-endpoint-identity-security - Five ways enterprises can stop synthetic identity fraud with AI
Tips on how enterprises can use AI to combat synthetic identity fraud.
URL: https://venturebeat.com/article/enterprises-stop-synthetic-identity-fraud-ai - Telesign Trust Index a call to action for any enterprise that’s discounting cybersecurity
Overview of the Telesign Trust Index and its implications for enterprise cybersecurity.
URL: https://venturebeat.com/article/telesign-trust-index-cybersecurity - The Top 10 endpoint security challenges and how to overcome them
Identifying the top 10 challenges in endpoint security and strategies for addressing them.
URL: https://venturebeat.com/article/top-10-endpoint-security-challenges - How Inductive Automation’s endpoint security strategy makes manufacturing more secure
Case study on Inductive Automation’s approach to enhancing endpoint security in manufacturing.
URL: https://venturebeat.com/article/inductive-automation-endpoint-security-manufacturing - Forrester predicts 2023’s top cybersecurity threats: From generative AI to geopolitical tensions
Forrester’s forecast of the leading cybersecurity threats for 2023, including generative AI and geopolitical factors.
URL: https://venturebeat.com/article/forrester-2023-cybersecurity-threats - Predicting the future of endpoint security in a zero-trust world
Exploring the future trends and developments in endpoint security within a zero-trust framework.
URL: https://venturebeat.com/article/future-endpoint-security-zero-trust - 5 ways AI-driven patch management is driving the future of cybersecurity
Discussing how AI-driven patch management is shaping the future of cybersecurity.
URL: https://venturebeat.com/article/ai-driven-patch-management-cybersecurity - VentureBeat Q&A: How Airgap CEO Ritesh Agrawal created an innovative cybersecurity startup
Interview with Airgap CEO Ritesh Agrawal about the creation and growth of his cybersecurity startup.
URL: https://venturebeat.com/article/airgap-ceo-ritesh-agrawal-cybersecurity-startup - 10 ways ChatGPT and generative AI can strengthen zero trust
Tips on how ChatGPT and generative AI technologies can enhance zero trust security measures.
URL: https://venturebeat.com/article/chatgpt-generative-ai-zero-trust - Getting cyber-resilience right in a zero-trust world starts at the endpoint
Emphasizing the importance of endpoint security in achieving cyber-resilience within a zero-trust model.
URL: https://venturebeat.com/article/cyber-resilience-zero-trust-endpoint - Announcements at RSAC 2023 show alliances, AI defining the future of cybersecurity
Highlights from RSAC 2023 showcasing the role of alliances and AI in shaping cybersecurity’s future.
URL: https://venturebeat.com/article/rsac-2023-alliances-ai-cybersecurity - How post-quantum cryptography will help fulfill the vision of zero trust
Exploring the role of post-quantum cryptography in advancing zero trust security.
URL: https://venturebeat.com/article/post-quantum-cryptography-zero-trust - The top 20 zero-trust startups to watch in 2023
A list of the top 20 emerging startups focused on zero-trust security in 2023.
URL: https://venturebeat.com/article/top-20-zero-trust-startups-2023 - Why unifying endpoints and identities is the future of zero trust
Discussing the significance of integrating endpoint and identity management for zero trust security.
URL: https://venturebeat.com/article/unifying-endpoints-identities-zero-trust - Managing machine identities in a zero-trust world
Examining the challenges and best practices for managing machine identities within a zero-trust framework.
URL: https://venturebeat.com/article/managing-machine-identities-zero-trust - Why some companies are forging ahead with cloud investments
Analysis of why certain companies continue to invest in cloud technologies despite challenges.
URL: https://venturebeat.com/article/companies-cloud-investments - Data center ops: How AI and ML are boosting efficiency and resilience
Exploring how AI and machine learning are enhancing data center operations.
URL: https://venturebeat.com/article/ai-ml-data-center-ops-efficiency-resilience - AI and ML: The new frontier for data center innovation and optimization
Discussing the impact of AI and machine learning on data center innovation and optimization.
URL: https://venturebeat.com/article/ai-ml-data-center-innovation-optimization - Data center dilemma: Retail CIOs seek ways to balance cost and value in 2023
Addressing the challenges faced by retail CIOs in balancing cost and value in data center management.
URL: https://venturebeat.com/article/retail-cios-data-center-cost-value - Defending against backdoor attacks with zero trust
Strategies for using zero-trust principles to defend against backdoor attacks.
URL: https://venturebeat.com/article/defending-backdoor-attacks-zero-trust - Zero trust for web and application access: Developing a cybersecurity playbook for BYOD and beyond
Creating a cybersecurity playbook for web and application access using zero-trust principles, with a focus on Bring Your Own Device (BYOD) policies.
URL: https://venturebeat.com/article/zero-trust-web-application-access-byod - Working in cybersecurity and zero trust with Ericom Software’s David Canellos
Interview with David Canellos of Ericom Software discussing his experiences and insights in cybersecurity and zero trust.
URL: https://venturebeat.com/article/cybersecurity-zero-trust-ericom-david-canellos - Securing cloud tech stacks with zero trust will drive growth of confidential computing
How zero-trust security models are driving the adoption of confidential computing in cloud tech stacks.
URL: https://venturebeat.com/article/securing-cloud-tech-stacks-zero-trust-confidential-computing - Why SASE will benefit from faster consolidation of networking and security
Discussing the advantages of integrating networking and security through Secure Access Service Edge (SASE) solutions.
URL: https://venturebeat.com/article/sase-consolidation-networking-security - A roadmap to zero-trust maturity: 6 key insights from Forrester
Key takeaways from Forrester’s report on achieving zero-trust maturity.
URL: https://venturebeat.com/article/roadmap-zero-trust-maturity-forrester - Defining endpoint security in a zero-trust world
Best practices and strategies for implementing effective endpoint security within a zero-trust framework.
URL: https://venturebeat.com/article/defining-endpoint-security-zero-trust - How access management helps protect identities in the cloud
Examining the role of access management in securing identities within cloud environments.
URL: https://venturebeat.com/article/access-management-cloud-identities - A zero-trust roadmap for cybersecurity in manufacturing — from a 98-year-old company
Case study on how a long-established company is adopting a zero-trust approach to cybersecurity in manufacturing.
URL: https://venturebeat.com/article/zero-trust-roadmap-cybersecurity-manufacturing
- The power of MLOps to scale AI across the enterprise
Exploring the benefits of Machine Learning Operations (MLOps) for scaling AI technologies across organizations.
URL: https://venturebeat.com/article/mlops-scale-ai-enterprise - CrowdStrike report shows identities under siege, cloud data theft up
Highlights from CrowdStrike’s report on the increasing threats to identities and cloud data security.
URL: https://venturebeat.com/article/crowdstrike-report-identities-cloud-data-theft - Access management must get stronger in a zero-trust world
Discussing the need for enhanced access management practices within zero-trust security frameworks.
URL: https://venturebeat.com/article/access-management-zero-trust - Modernizing identity access management with zero trust
Strategies for updating and improving identity access management using zero-trust principles.
URL: https://venturebeat.com/article/modernizing-identity-access-management-zero-trust - Creating secure customer experiences with zero trust
Best practices for leveraging zero-trust security to ensure safe customer interactions.
URL: https://venturebeat.com/article/secure-customer-experiences-zero-trust - How threat intelligence helps SecOps prevent cyberevents before they happen
Exploring the role of threat intelligence in enabling Security Operations (SecOps) to preemptively address cyber threats.
URL: https://venturebeat.com/article/threat-intelligence-secops-cyberevents - How to use zero trust and IAM to defend against cyberattacks in an economic downturn
Discussing the importance of zero-trust and identity access management (IAM) in maintaining cybersecurity during economic challenges.
URL: https://venturebeat.com/article/zero-trust-iam-cyberattacks-economic-downturn - Experts predict how AI will energize cybersecurity in 2023 and beyond
Predictions on the future impact of AI on cybersecurity from industry experts.
URL: https://venturebeat.com/article/ai-energize-cybersecurity-2023 - Zero trust, XDR prominent in Gartner’s Hype Cycle for Endpoint Security
Analysis of Gartner’s Hype Cycle report highlighting the importance of zero trust and Extended Detection and Response (XDR).
URL: https://venturebeat.com/article/zero-trust-xdr-gartner-hype-cycle-endpoint-security - Benchmarking your cybersecurity budget in 2023
Tips and guidelines for evaluating and optimizing your cybersecurity budget for the year 2023.
URL: https://venturebeat.com/article/benchmarking-cybersecurity-budget-2023 - Ransomware attackers finding new ways to weaponize old vulnerabilities
Examining how ransomware attackers are exploiting legacy vulnerabilities to launch new attacks.
URL: https://venturebeat.com/article/ransomware-attackers-weaponize-old-vulnerabilities - CISOs: Self-healing endpoints key to consolidating tech stacks, improving cyber-resiliency
Discussing the role of self-healing endpoints in enhancing cybersecurity and consolidating technology stacks.
URL: https://venturebeat.com/article/self-healing-endpoints-cyber-resiliency - 5 steps to deal with the inevitable data breaches of 2023
Providing actionable steps for addressing and mitigating data breaches expected in 2023.
URL: https://venturebeat.com/article/steps-deal-data-breaches-2023 - Zero trust’s creator John Kindervag shares his insights with VentureBeat — Part II
The second part of an interview with John Kindervag, the creator of zero trust, discussing his insights.
URL: https://venturebeat.com/article/john-kindervag-zero-trust-insights-part-2 - Zero trust’s creator John Kindervag shares his insights with VentureBeat — Part I
The first part of an interview with John Kindervag, the creator of zero trust, discussing his insights.
URL: https://venturebeat.com/article/john-kindervag-zero-trust-insights-part-1 - The cloud’s growing impact on cybersecurity
Exploring how cloud technologies are influencing and reshaping cybersecurity strategies.
URL: https://venturebeat.com/article/cloud-impact-cybersecurity - Getting results from your zero-trust initiatives in 2023
Tips and strategies for successfully implementing zero-trust security initiatives in 2023.
URL: https://venturebeat.com/article/zero-trust-initiatives-2023 - Why enterprises trust hardware-based security over quantum computing
Discussing why many organizations prefer hardware-based security solutions over emerging quantum computing options.
URL: https://venturebeat.com/article/enterprises-trust-hardware-based-security-quantum-computing - 10 steps every business can take to avoid a cybersecurity breach
Providing practical steps for businesses to prevent cybersecurity breaches.
URL: https://venturebeat.com/article/10-steps-avoid-cybersecurity-breach - Making security invisible with adaptive access management
How adaptive access management can create seamless and unobtrusive security measures.
URL: https://venturebeat.com/article/adaptive-access-management-invisible-security - Securing a dynamic future for APIs and enterprise integration
Strategies for ensuring the security of APIs and enterprise integration processes.
URL: https://venturebeat.com/article/securing-apis-enterprise-integration - How CIOs can drive identity-based security awareness
Discussing the role of CIOs in promoting identity-based security awareness within organizations.
URL: https://venturebeat.com/article/cios-identity-based-security-awareness - How automation, low code/no code can fight the talent shortage
Exploring how automation and low code/no code solutions can address the cybersecurity talent gap.
URL: https://venturebeat.com/article/automation-low-code-no-code-talent-shortage - How password management tools are helping enterprises prevent intrusions
Examining the effectiveness of password management tools in enhancing enterprise security.
URL: https://venturebeat.com/article/password-management-tools-prevent-intrusions - Glassdoor’s best cybersecurity companies for job hunters in 2023
Listing the top cybersecurity companies for job seekers, based on Glassdoor reviews.
URL: https://venturebeat.com/article/glassdoor-best-cybersecurity-companies-2023 - 5 ways endpoints are turbocharging cybersecurity innovation
Exploring how advancements in endpoint security are driving innovation in cybersecurity.
URL: https://venturebeat.com/article/endpoints-turbocharging-cybersecurity-innovation - Why IAM’s identity-first security is core to zero trust
Discussing the importance of identity-first security within Identity and Access Management (IAM) for zero-trust models.
URL: https://venturebeat.com/article/iam-identity-first-security-zero-trust - How hybrid cybersecurity is strengthened by AI, machine learning and human intelligence
Exploring the benefits of combining AI, machine learning, and human expertise in hybrid cybersecurity approaches.
URL: https://venturebeat.com/article/hybrid-cybersecurity-ai-machine-learning-human-intelligence - Defensive vs. offensive AI: Why security teams are losing the AI war
Analysis of the challenges security teams face in the AI arms race, comparing defensive and offensive AI strategies.
URL: https://venturebeat.com/article/defensive-offensive-ai-security-teams
2022
- How leading endpoint security providers compare on enterprise performance
A comparative analysis of leading endpoint security providers based on enterprise performance metrics.
URL: https://venturebeat.com/article/leading-endpoint-security-providers-enterprise-performance - Why next-generation firewalls will be essential to a zero-trust world
Discussing the critical role of next-generation firewalls in supporting zero-trust security frameworks.
URL: https://venturebeat.com/article/next-generation-firewalls-zero-trust - ZTNA 2.0 gains multicloud momentum in Palo Alto Networks’ customer base
How Zero Trust Network Access (ZTNA) 2.0 is gaining traction among Palo Alto Networks’ customers.
URL: https://venturebeat.com/article/ztna-2-multicloud-palo-alto-networks - At Ignite ’22 cybersecurity conference, Palo Alto Networks looks to capitalize on consolidation
Highlights from the Ignite ’22 conference, focusing on Palo Alto Networks’ consolidation strategy.
URL: https://venturebeat.com/article/ignite-22-palo-alto-networks-consolidation - 2023 cybersecurity forecasts: Zero trust, cloud security will top spending
Predictions for cybersecurity spending in 2023, with an emphasis on zero trust and cloud security.
URL: https://venturebeat.com/article/2023-cybersecurity-forecasts-zero-trust-cloud-security - Cybersecurity leaders say they aren’t prepared to prevent a breach — what needs to improve in 2023?
Survey results indicating cybersecurity leaders’ concerns about breach prevention and areas needing improvement.
URL: https://venturebeat.com/article/cybersecurity-leaders-prepared-prevent-breach-2023 - Why the manufacturing sector must make zero trust a top priority in 2023
Discussing the importance of adopting zero trust security measures in the manufacturing industry.
URL: https://venturebeat.com/article/manufacturing-sector-zero-trust-2023 - Why 90% of enterprises migrating to the cloud are adopting zero trust
Analysis of why a significant majority of enterprises moving to the cloud are implementing zero trust security models.
URL: https://venturebeat.com/article/enterprises-cloud-migration-zero-trust - Why CISOs need to make software bills of materials (SBOMs) a top priority in 2023
Emphasizing the importance of SBOMs for cybersecurity and why CISOs should prioritize them.
URL: https://venturebeat.com/article/cisos-software-bills-of-materials-sboms-2023 - How CISOs get multicloud security right with CIEM
Strategies for Chief Information Security Officers (CISOs) to effectively manage multicloud security using Cloud Infrastructure Entitlement Management (CIEM).
URL: https://venturebeat.com/article/cisos-multicloud-security-ciem - How Honeywell is bridging gaps in legacy OT, IT and industrial control systems for manufacturers
Examining Honeywell’s efforts to integrate legacy operational technology (OT), information technology (IT), and industrial control systems.
URL: https://venturebeat.com/article/honeywell-legacy-ot-it-industrial-control-systems - Where CISOs rely on AI and machine learning to strengthen cybersecurity
Discussing the key areas where CISOs are leveraging AI and machine learning to enhance cybersecurity.
URL: https://venturebeat.com/article/cisos-ai-machine-learning-cybersecurity - Where CISOs are getting quick zero-trust wins today to save tomorrow’s budgets
Highlighting successful zero-trust strategies that are providing immediate benefits for CISOs.
URL: https://venturebeat.com/article/cisos-quick-zero-trust-wins - How CISOs can drive revenue gains and advance their careers
Tips for CISOs on how to contribute to organizational revenue growth and career advancement.
URL: https://venturebeat.com/article/cisos-drive-revenue-career-advancement - Forrester offers guidance on getting zero trust right and achieving security goals
Forrester’s recommendations for successfully implementing zero trust security frameworks and achieving security objectives.
URL: https://venturebeat.com/article/forrester-zero-trust-security-goals - MITRE’s MDR stress-test winners combine human intelligence and AI for stronger cybersecurity
Analysis of MITRE’s Managed Detection and Response (MDR) stress-test winners and their use of AI and human intelligence.
URL: https://venturebeat.com/article/mitre-mdr-stress-test-winners - Forrester’s 2023 predictions indicate a bumpy road ahead for CISOs
Forrester’s forecast for 2023 highlighting the challenges CISOs are expected to face.
URL: https://venturebeat.com/article/forrester-2023-predictions-cisos-challenges - The manufacturing industry’s security epidemic needs a zero-trust cure
Discussing the cybersecurity challenges in the manufacturing industry and the need for zero-trust solutions.
URL: https://venturebeat.com/article/manufacturing-industry-security-zero-trust - Why zero trust needs to live on the edge
Explaining the importance of extending zero-trust security principles to edge computing environments.
URL: https://venturebeat.com/article/zero-trust-edge-computing - 5 reasons zero trust is the future of endpoint security
Highlighting five key reasons why zero trust is becoming essential for endpoint security.
URL: https://venturebeat.com/article/zero-trust-endpoint-security - How zero trust closes security gaps in multicloud tech stacks
Discussing the role of zero trust in addressing security vulnerabilities in multicloud environments.
URL: https://venturebeat.com/article/zero-trust-multicloud-tech-stacks - How to secure an expanding landscape of endpoints and identities
Strategies for securing a growing number of endpoints and identities within organizations.
URL: https://venturebeat.com/article/securing-endpoints-identities - How self-healing endpoints are a solution to identities under siege
Exploring how self-healing endpoint technologies can protect against identity-based cyber threats.
URL: https://venturebeat.com/article/self-healing-endpoints-identities - Ransomware vulnerabilities soar as attackers look for easy targets
Analyzing the rise in ransomware vulnerabilities and the strategies attackers use to exploit them.
URL: https://venturebeat.com/article/ransomware-vulnerabilities-attackers - Gartner research finds no single tool protects app security
Findings from Gartner’s research indicating that no single tool can ensure comprehensive application security.
URL: https://venturebeat.com/article/gartner-research-app-security - Which cybersecurity metrics matter most to CISOs today?
Discussing the key cybersecurity metrics that are most relevant to CISOs.
URL: https://venturebeat.com/article/cybersecurity-metrics-cisos - How cloud PAM can transform the enterprise
Exploring the benefits of Cloud Privileged Access Management (PAM) for enterprise security.
URL: https://venturebeat.com/article/cloud-pam-enterprise-security - Zero trust is critical as more enterprises sacrifice security for speed
Emphasizing the importance of zero-trust security as enterprises prioritize speed over security.
URL: https://venturebeat.com/article/zero-trust-enterprises-security-speed - Why data loss prevention (DLP) matters in a zero-trust world
Discussing the significance of Data Loss Prevention (DLP) in maintaining zero-trust security.
URL: https://venturebeat.com/article/data-loss-prevention-zero-trust - Why web apps are one of this year’s leading attack vectors
Analysis of why web applications are a primary target for cyber attacks in the current year.
URL: https://venturebeat.com/article/web-apps-attack-vectors - 15 top-paying IT certifications for 2022, security leads the way
A list of the highest-paying IT certifications for 2022, with a focus on security credentials.
URL: https://venturebeat.com/article/top-paying-it-certifications-2022 - What the zero-trust security market looks like beyond 2022
Exploring the future trends and developments in the zero-trust security market beyond 2022.
URL: https://venturebeat.com/article/zero-trust-security-market-2022 - How CrowdStrike consolidates tech stacks as a growth strategy
Discussing CrowdStrike’s approach to consolidating technology stacks to drive growth.
URL: https://venturebeat.com/article/crowdstrike-tech-stacks-growth-strategy - CrowdStrike’s platform plan at Fal.con melds security and observability
Insights from CrowdStrike’s platform strategy combining security and observability presented at Fal.con.
URL: https://venturebeat.com/article/crowdstrike-platform-plan-falcon-security-observability - How zero trust can improve mobile security
Examining the benefits of zero-trust principles for enhancing mobile security.
URL: https://venturebeat.com/article/zero-trust-mobile-security - Unified endpoint management (UEM) tools: What’s new in Gartner’s Magic Quadrant
Overview of the latest trends and updates in Gartner’s Magic Quadrant for Unified Endpoint Management (UEM) tools.
URL: https://venturebeat.com/article/gartner-magic-quadrant-iem-tools - How zero trust can help battle identities under siege
Strategies for using zero-trust security to protect against identity-related cyber threats.
URL: https://venturebeat.com/article/zero-trust-identities - Why getting microsegmentation right is key to zero trust
Discussing the importance of effective microsegmentation for implementing zero-trust security.
URL: https://venturebeat.com/article/microsegmentation-zero-trust - 5 ways to secure devops
Providing practical tips for securing DevOps processes and environments.
URL: https://venturebeat.com/article/secure-devops - Healthcare ransomware attacks are increasing – how to prepare
Examining the rise in ransomware attacks targeting healthcare and how to prepare for them.
URL: https://venturebeat.com/article/healthcare-ransomware-attacks-preparation - How new CISOs should take on today’s growing threatscape
Advice for new Chief Information Security Officers (CISOs) on addressing the evolving threat landscape.
URL: https://venturebeat.com/article/new-cisos-growing-threatscape - APIs and zero trust named as top priorities for CISOs in 2023
Identifying APIs and zero trust as key focus areas for CISOs in the upcoming year.
URL: https://venturebeat.com/article/apis-zero-trust-cisos-2023 - Why Getting Endpoint Security Right Is Crucial
Discussing the importance of properly implementing endpoint security measures.
URL: https://venturebeat.com/article/getting-endpoint-security-right - How Cybersecurity Vendors Are Misrepresenting Zero Trust
Analysis of how some cybersecurity vendors are inaccurately portraying zero-trust solutions.
URL: https://venturebeat.com/article/cybersecurity-vendors-misrepresenting-zero-trust - Black Hat 2022 reveals enterprise security trends
Highlights from Black Hat 2022 conference on the latest enterprise security trends.
URL: https://venturebeat.com/article/black-hat-2022-enterprise-security-trends - Black Hat 2022: Why machine identities are the most vulnerable
Discussing why machine identities are particularly at risk according to Black Hat 2022 insights.
URL: https://venturebeat.com/article/black-hat-2022-machine-identities - Why managed detection and response (MDR) adoption is growing among small businesses
Exploring the reasons behind the increasing adoption of Managed Detection and Response (MDR) solutions by small businesses.
URL: https://venturebeat.com/article/mdr-adoption-small-businesses - Why web apps need to improve secure service access
Discussing the necessity for web applications to enhance secure access to services.
URL: https://venturebeat.com/article/web-apps-secure-service-access - IBM report shows healthcare has a growing cybersecurity gap
Findings from IBM’s report on the expanding cybersecurity gaps in the healthcare sector.
URL: https://venturebeat.com/article/ibm-healthcare-cybersecurity-gap - Why the future of APIs must include zero trust
Discussing the need for incorporating zero-trust principles into the future development of APIs.
URL: https://venturebeat.com/article/future-apis-zero-trust - Why enterprises face challenges in protecting machine identities
Exploring the difficulties organizations encounter in securing machine identities.
URL: https://venturebeat.com/article/enterprises-protecting-machine-identities - How Honeywell is Using AI To Improve Warehouse Performance
Case study on Honeywell’s use of AI to enhance warehouse operations and performance.
URL: https://venturebeat.com/article/honeywell-ai-warehouse-performance - What Identity Threat Detection and Response (ITDR) means in a zero trust world
Explaining the concept of Identity Threat Detection and Response (ITDR) within a zero-trust framework.
URL: https://venturebeat.com/article/identity-threat-detection-response-itdr - Forrester has a compelling vision for the future of endpoint management
Forrester’s predictions and insights on the future trends in endpoint management.
URL: https://venturebeat.com/article/forrester-future-endpoint-management - Forrester’s best practices for zero-trust microsegmentation
Best practices for implementing microsegmentation as part of a zero-trust security strategy.
URL: https://venturebeat.com/article/forrester-zero-trust-microsegmentation - 5 ways AI is detecting and preventing identity fraud
Exploring how AI technologies are being used to identify and prevent identity fraud.
URL: https://venturebeat.com/article/ai-detecting-preventing-identity-fraud - Building a business case for zero-trust, multicloud security
Tips on developing a compelling business case for adopting zero-trust security in multicloud environments.
URL: https://venturebeat.com/article/business-case-zero-trust-multicloud-security - Struggling with endpoint security? How to get it right
Providing guidance on overcoming common challenges in endpoint security implementation.
URL: https://venturebeat.com/article/struggling-endpoint-security - Why extended detection and response (XDR) is seeing enterprise growth
Discussing the factors contributing to the rise of Extended Detection and Response (XDR) solutions in enterprises.
URL: https://venturebeat.com/article/xdr-enterprise-growth - Demystifying zero-trust network access 2.0
Clarifying the concepts and benefits of Zero-Trust Network Access (ZTNA) 2.0.
URL: https://venturebeat.com/article/zero-trust-network-access-2 - 2022 cybersecurity forecasts predict growth, emphasizing resilience
Predictions for the growth of cybersecurity in 2022, with a focus on resilience.
URL: https://venturebeat.com/article/2022-cybersecurity-forecasts - Improving digital employee experiences must start with cybersecurity
Highlighting the importance of prioritizing cybersecurity to enhance digital employee experiences.
URL: https://venturebeat.com/article/improving-digital-employee-experiences-cybersecurity - Zero-trust market shows signs of maturity at RSA 2022
Insights from RSA 2022 indicating the maturation of the zero-trust security market.
URL: https://venturebeat.com/article/zero-trust-market-maturity-rsa-2022 - What Gartner’s top cybersecurity predictions for 2022-23 reveal
Summary of Gartner’s top cybersecurity predictions for the years 2022-23.
URL: https://venturebeat.com/article/gartner-cybersecurity-predictions-2022-23 - Cybersecurity landscape: The state of managed security services, 2022
Overview of the current state and trends in managed security services for the year 2022.
URL: https://venturebeat.com/article/cybersecurity-landscape-managed-security-services-2022 - How AI and bots strengthen endpoint security
Exploring how artificial intelligence and bots are enhancing endpoint security measures.
URL: https://venturebeat.com/article/ai-bots-endpoint-security - Corel adds zero trust tech to its strength with Awingu acquisition
Analysis of Corel’s acquisition of Awingu and its impact on zero-trust technology capabilities.
URL: https://venturebeat.com/article/corel-awingu-acquisition-zero-trust - How AI Is Shaping The Future Of Work
Discussing the transformative effects of AI on the future of work.
URL: https://venturebeat.com/article/ai-shaping-future-work - Why Edge and Endpoint Security Matters In A Zero Trust World
Emphasizing the importance of edge and endpoint security within zero-trust frameworks.
URL: https://venturebeat.com/article/edge-endpoint-security-zero-trust - How Microsoft plans to improve the low code landscape
Overview of Microsoft’s strategies for enhancing low code development environments.
URL: https://venturebeat.com/article/microsoft-low-code-landscape - Recovering from ransomware attacks starts with better endpoint security
Discussing the role of endpoint security in recovering from ransomware incidents.
URL: https://venturebeat.com/article/recovering-ransomware-attacks-endpoint-security - How weaponized ransomware is quickly becoming more lethal
Analysis of the increasing lethality of weaponized ransomware attacks.
URL: https://venturebeat.com/article/weaponized-ransomware-lethal - How AI can improve services revenue and customer success
Exploring how AI technologies can boost service revenue and customer success rates.
URL: https://venturebeat.com/article/ai-services-revenue-customer-success - How remote browser isolation can shut down virtual meeting hijackers
Discussing the benefits of remote browser isolation in preventing virtual meeting hijacks.
URL: https://venturebeat.com/article/remote-browser-isolation-virtual-meeting-hijackers - How AI can close gaps in cybersecurity tech stacks
Exploring the role of AI in addressing gaps within cybersecurity technology stacks.
URL: https://venturebeat.com/article/ai-cybersecurity-tech-stacks - Why Private Edge Networks are growing in the enterprise this year
Analyzing the growth of private edge networks in enterprises during the current year.
URL: https://venturebeat.com/article/private-edge-networks-enterprise - 10 things CISOs need to know about zero trust
Providing critical insights for Chief Information Security Officers (CISOs) regarding zero-trust security.
URL: https://venturebeat.com/article/cisos-zero-trust - AI’s growing enterprise gaps explain why AWS SageMaker is growing
Discussing the reasons behind the increasing adoption of AWS SageMaker due to enterprise AI gaps.
URL: https://venturebeat.com/article/aws-sagemaker-enterprise-ai-gaps - Gartner lists seven cybersecurity trends for 2022
Summary of Gartner’s identified top cybersecurity trends for the year 2022.
URL: https://venturebeat.com/article/gartner-cybersecurity-trends-2022 - Why Remote Browser Isolation is Core To Zero Trust Security
Examining the role of remote browser isolation in zero-trust security models.
URL: https://venturebeat.com/article/remote-browser-isolation-zero-trust - How Nvidia is Harnessing AI To Improve Predictive Maintenance
Exploring Nvidia’s use of AI for enhancing predictive maintenance capabilities.
URL: https://venturebeat.com/article/nvidia-ai-predictive-maintenance - How Ivanti hopes to redefine cybersecurity with AI
Overview of Ivanti’s ambitions to transform cybersecurity through artificial intelligence.
URL: https://venturebeat.com/article/ivanti-redefining-cybersecurity-ai - Telecoms bet 5G will help them own Industry 4.0
Analysis of how telecommunications companies are leveraging 5G to lead in Industry 4.0.
URL: https://venturebeat.com/article/telecoms-5g-industry-4 - Why analytics are core to any endpoint security business case
Discussing the critical role of analytics in justifying endpoint security investments.
URL: https://venturebeat.com/article/analytics-endpoint-security-business-case - 10 ways analytics improves endpoint security and asset management
Exploring ten ways in which analytics enhances endpoint security and asset management.
URL: https://venturebeat.com/article/analytics-endpoint-security-asset-management - AI brings greater resilience to self-healing endpoints
Examining how AI contributes to the resilience of self-healing endpoint technologies.
URL: https://venturebeat.com/article/ai-self-healing-endpoints - Predicting the future of AI and analytics in endpoint security
Forecasting the future trends in AI and analytics within the realm of endpoint security.
URL: https://venturebeat.com/article/future-ai-analytics-endpoint-security - How AI protects machine identities in a zero-trust world
Discussing the role of AI in safeguarding machine identities within a zero-trust framework.
URL: https://venturebeat.com/article/ai-machine-identities-zero-trust - 20 top metrics tracked by CEOs of enterprise software startups
Listing the top 20 metrics that CEOs of enterprise software startups monitor.
URL: https://venturebeat.com/article/top-metrics-ceos-enterprise-software-startups - 20 most popular metrics with enterprise software startup CEOs
Exploring the most frequently tracked metrics among CEOs of enterprise software startups.
URL: https://venturebeat.com/article/popular-metrics-enterprise-software-startup-ceos - How HPE’s private 5G creates more intelligent enterprise networks
Examining how HPE’s private 5G solutions enhance enterprise network intelligence.
URL: https://venturebeat.com/article/hpe-private-5g-intelligent-enterprise-networks - Cybersecurity’s challenge for 2022 is defeating weaponized ransomware
Analyzing the main cybersecurity challenge for 2022: combating weaponized ransomware.
URL: https://venturebeat.com/article/cybersecurity-challenge-2022-weaponized-ransomware - Zero-trust trends for 2022
Highlighting the key trends in zero-trust security for the year 2022.
URL: https://venturebeat.com/article/zero-trust-trends-2022 - 5 ways AI and ML will improve cybersecurity in 2022
Exploring five ways in which artificial intelligence and machine learning will enhance cybersecurity efforts in 2022.
URL: https://venturebeat.com/article/ai-ml-improve-cybersecurity-2022 - SAP supply chains need zero trust to reach enterprise cybersecurity
Discussing the importance of zero trust for securing SAP supply chains and achieving enterprise cybersecurity.
URL: https://venturebeat.com/article/sap-supply-chains-zero-trust-cybersecurity - How to build a data science and machine learning roadmap in 2022
Providing a guide for developing a data science and machine learning strategy for 2022.
URL: https://venturebeat.com/article/data-science-machine-learning-roadmap-2022 - How combining human expertise and AI helps stop cyberattacks
Examining the benefits of integrating human intelligence with AI to prevent cyberattacks.
URL: https://venturebeat.com/article/human-expertise-ai-stop-cyberattacks - Top 5 trends for endpoint security In 2022
Identifying the top five trends that will shape endpoint security in 2022.
URL: https://venturebeat.com/article/top-5-trends-endpoint-security-2022
2021
- How a startup uses AI to put worker safety first
Case study on how a startup leverages AI technologies to enhance worker safety.
URL: https://venturebeat.com/article/startup-ai-worker-safety - Why IoT is the cornerstone of AWS’s zero-trust strategy
Discussing the role of Internet of Things (IoT) in Amazon Web Services’ (AWS) zero-trust security strategy.
URL: https://venturebeat.com/article/iot-aws-zero-trust-strategy - Accenture and AWS partner up to help enterprises innovate faster
Overview of the collaboration between Accenture and AWS to drive enterprise innovation.
URL: https://venturebeat.com/article/accenture-aws-enterprise-innovation - Zero trust network access should be on every CISO’s SASE roadmap
Discussing the importance of Zero Trust Network Access (ZTNA) in Security Access Service Edge (SASE) roadmaps for CISOs.
URL: https://venturebeat.com/article/zero-trust-network-access-sase-roadmap - How AI and ML can thwart a cybersecurity threat no one talks about
Exploring how artificial intelligence and machine learning can address overlooked cybersecurity threats.
URL: https://venturebeat.com/article/ai-ml-thwart-cybersecurity-threat - How Nvidia aims to demystify zero trust security
Examining Nvidia’s efforts to simplify and promote zero-trust security principles.
URL: https://venturebeat.com/article/nvidia-demystify-zero-trust-security - IT skills gap is forcing leaders to prioritize cloud and security hires
Discussing how the IT skills gap is driving the need for hiring in cloud and security roles.
URL: https://venturebeat.com/article/it-skills-gap-cloud-security-hires - BMW uses Nvidia’s Omniverse to build state-of-the-art factories
Case study on BMW’s use of Nvidia’s Omniverse platform to develop advanced manufacturing facilities.
URL: https://venturebeat.com/article/bmw-nvidia-omniverse-factories - Ransomware attacks are getting more complex and even harder to prevent
Analysis of the increasing complexity of ransomware attacks and the challenges in preventing them.
URL: https://venturebeat.com/article/ransomware-attacks-complex-prevention - 7 Ways To protect pharma supply chains in 2022
Providing seven strategies for securing pharmaceutical supply chains in 2022.
URL: https://venturebeat.com/article/protect-pharma-supply-chains-2022 - Microsoft expands zero trust security capabilities at Ignite 2021
Highlights from Microsoft’s Ignite 2021 conference on expanding zero-trust security features.
URL: https://venturebeat.com/article/microsoft-zero-trust-ignite-2021 - Rubrik and Microsoft team up to secure hybrid clouds in a zero trust world
Discussing the collaboration between Rubrik and Microsoft to enhance hybrid cloud security using zero-trust principles.
URL: https://venturebeat.com/article/rubrik-microsoft-hybrid-clouds-zero-trust - How Moveworks’ AI platform broke through the multilingual NLP barrier
Case study on Moveworks’ AI platform overcoming challenges in multilingual natural language processing (NLP).
URL: https://venturebeat.com/article/moveworks-ai-multilingual-nlp - Google’s future in enterprise hinges on strategic cybersecurity
Exploring the importance of strategic cybersecurity for Google’s future in the enterprise market.
URL: https://venturebeat.com/article/google-enterprise-strategic-cybersecurity - How health care organizations can improve their cybersecurity in 2021
Providing tips for healthcare organizations to enhance their cybersecurity practices in 2021.
URL: https://venturebeat.com/article/healthcare-organizations-cybersecurity-2021 - Enterprises are scrambling to deploy zero trust security
Discussing the rush among enterprises to implement zero-trust security measures.
URL: https://venturebeat.com/article/enterprises-deploy-zero-trust-security - Why enterprise patch management pains are cybercriminals’ gain
Exploring how difficulties in enterprise patch management can be exploited by cybercriminals.
URL: https://venturebeat.com/article/enterprise-patch-management-cybercriminals - Zero trust and UES lead Gartner’s 2021 Hype Cycle for Endpoint Security
Highlighting the prominence of zero-trust and Unified Endpoint Security (UES) in Gartner’s 2021 Hype Cycle.
URL: https://venturebeat.com/article/gartner-2021-hype-cycle-endpoint-security - Educational targets hit by rising cyberattacks in 2021
Analysis of the increase in cyberattacks targeting educational institutions in 2021.
URL: https://venturebeat.com/article/educational-targets-cyberattacks-2021 - LinkedIn’s Top Startups of 2021 spotlights the enterprise data stack
Overview of LinkedIn’s list of top startups for 2021, with a focus on the enterprise data stack.
URL: https://venturebeat.com/article/linkedin-top-startups-2021 - The state of MLOps in 2021 is dominated by startups
Examining the dominance of startups in the Machine Learning Operations (MLOps) landscape for 2021.
URL: https://venturebeat.com/article/state-mlops-2021 - Celebrating AI-infused talent management at the Eightfold conference
Highlights from the Eightfold conference focusing on AI-driven talent management solutions.
URL: https://venturebeat.com/article/eightfold-conference-ai-talent-management - Zero-trust security could reduce cyber trust gap
Discussing how zero-trust security models can address and mitigate the cyber trust gap.
URL: https://venturebeat.com/article/zero-trust-security-cyber-trust-gap - API security report from Forrester
Summary and insights from Forrester’s report on API security trends and challenges.
URL: https://venturebeat.com/article/api-security-report-forrester - Global Knowledge Piece – top paying certifications
Analysis of the top-paying IT certifications based on Global Knowledge’s research.
URL: https://venturebeat.com/article/global-knowledge-top-paying-certifications - How To Improve COVID-19 Supply Chain Cybersecurity
Providing strategies to enhance the cybersecurity of supply chains affected by the COVID-19 pandemic.
URL: https://venturebeat.com/article/covid-19-supply-chain-cybersecurity - Realizing IoT’s Potential with AI and Machine Learning
Exploring how AI and machine learning technologies are unlocking the potential of IoT.
URL: https://venturebeat.com/article/iot-potential-ai-machine-learning - The Top Trends Shaping Identity And Access Management In 2021
Identifying the key trends influencing Identity and Access Management (IAM) in 2021.
URL: https://venturebeat.com/article/trends-identity-access-management-2021 - What’s New In Hype Cycle for Cloud Security, 2021
Overview of the latest developments in Gartner’s Hype Cycle for Cloud Security for 2021.
URL: https://venturebeat.com/article/hype-cycle-cloud-security-2021 - How data-driven patch management can defeat ransomware
Discussing the role of data-driven patch management in combating ransomware attacks.
URL: https://venturebeat.com/article/data-driven-patch-management-ransomware - 6 ways to protect your pharma company from cyberattacks (Absolute mentioned)
Providing six strategies for pharmaceutical companies to defend against cyberattacks, mentioning Absolute.
URL: https://venturebeat.com/article/protect-pharma-cyberattacks-absolute - CISO implementation guide: 10 ways to ensure a cybersecurity partnership will work (Absolute mentioned)
Guide for Chief Information Security Officers (CISOs) on establishing successful cybersecurity partnerships, mentioning Absolute.
URL: https://venturebeat.com/article/ciso-implementation-guide-cybersecurity-partnership-absolute - 7 keys to evaluating zero trust security frameworks
Providing key considerations for evaluating zero-trust security frameworks.
URL: https://venturebeat.com/article/evaluating-zero-trust-security-frameworks - Absolute Endpoint Risk Management Report
Summary and insights from Absolute’s report on endpoint risk management.
URL: https://venturebeat.com/article/absolute-endpoint-risk-management-report - Verizon details cloud cybercrime roots in data breach report
Highlighting Verizon’s findings on the origins of cloud cybercrime in their data breach report.
URL: https://venturebeat.com/article/verizon-cloud-cybercrime-data-breach-report - AI, cyber terrain analytics improve hybrid multicloud security
Discussing how AI and cyber terrain analytics are enhancing security in hybrid multicloud environments.
URL: https://venturebeat.com/article/ai-cyber-terrain-analytics-hybrid-multicloud-security - SolarWinds breach exposes hybrid multicloud security weaknesses
Examining the security vulnerabilities in hybrid multicloud environments revealed by the SolarWinds breach.
URL: https://venturebeat.com/article/solarwinds-breach-hybrid-multicloud-security-weaknesses - Hybrid multiclouds promise easier upgrades, but threaten data risk – article 1 in the series
Discussing the benefits and risks associated with hybrid multicloud deployments, as the first article in a series.
URL: https://venturebeat.com/article/hybrid-multiclouds-upgrades-data-risk - DeHyping Endpoint Security: Can Endpoints Self-Heal?
Exploring the potential and limitations of self-healing endpoint security technologies.
URL: https://venturebeat.com/article/dehyping-endpoint-security-self-healing - Is poor data quality undermining your marketing AI?
Discussing the impact of poor data quality on the effectiveness of marketing AI solutions.
URL: https://venturebeat.com/article/poor-data-quality-marketing-ai - Edelman Trust Barometer story
Insights and analysis from the Edelman Trust Barometer report.
URL: https://venturebeat.com/article/edelman-trust-barometer-story - Verizon finds companies relaxed mobile security policies to get employees online
Highlighting Verizon’s findings on the relaxation of mobile security policies to facilitate remote work.
URL: https://venturebeat.com/article/verizon-companies-mobile-security-policies - What AI Can And Can’t Deliver in CRM
Exploring the capabilities and limitations of artificial intelligence in Customer Relationship Management (CRM).
URL: https://venturebeat.com/article/ai-crm-capabilities-limitations - Data-centric security is key to resiliency, cyber risk report says
Discussing the importance of data-centric security approaches for improving cybersecurity resilience.
URL: https://venturebeat.com/article/data-centric-security-cyber-risk-report - Eight Ways AI Is Transforming Talent Management In 2021
Examining eight ways in which artificial intelligence is revolutionizing talent management practices in 2021.
URL: https://venturebeat.com/article/ai-transforming-talent-management-2021 - Which BI apps do enterprise users most admire?
Survey results identifying the most admired Business Intelligence (BI) applications among enterprise users.
URL: https://venturebeat.com/article/bi-apps-enterprise-users-admire - Gartner’s 2021 Magic Quadrant cites ‘glut of innovation’ in data science and ML
Overview of Gartner’s 2021 Magic Quadrant report highlighting the innovation surge in data science and machine learning.
URL: https://venturebeat.com/article/gartner-2021-magic-quadrant-data-science-ml - Top 10 cybersecurity lessons learned one year into the pandemic
Reflecting on the top ten cybersecurity lessons from the first year of the COVID-19 pandemic.
URL: https://venturebeat.com/article/top-10-cybersecurity-lessons-pandemic








You must be logged in to post a comment.