Digital Executive Protection: the New Corporate Mandate

The lines between cybersecurity and physical safety are blurring. Case in point: company executives and board members are under attack – both physically and digitally. Business leaders are high-value targets to cybercriminals who exploit their personal networks, private data, and…

Keep Reading
The Myth of the Lone Wolf CISO

At the 3 Tree Tech Stealth Security Experience in Chicago, Rick Doten shut down one of the biggest misconceptions in cybersecurity: the lone wolf CISO. The idea that one person can single-handedly defend an entire organization is not just outdated,…

Keep Reading
Leading the Future of Cybersecurity: Black Leadership, Mentorship & Impact

This year, for Black History Month, I wanted to highlight an active leader within IT security. Representation matters, and having strong Black leaders in tech not only paves the way for the next generation but also ensures diverse perspectives in…

Keep Reading
The Big Data Boom: Laying the Groundwork for the AI Explosion

BOOM! Big Data! The 2000s and the 2010s predicted and promised that Big Data was going to take over the tech industry. Did that happen? Not necessarily how everyone thought it would. Big Data became the focus of the technology…

Keep Reading
Think Your Cybersecurity’s Solid? Here’s What a Real Crisis Will Expose

At 3 Tree Tech’s Stealth Security Experience in Chicago, Shefali Mookencherry from the University of Illinois Chicago shared a powerful perspective on cybersecurity crisis management. “Cybersecurity is like an orchestra,” she explained, “where every role has to work in harmony…

Keep Reading
The Swiss Army Knife of Data Security

At the 3 Tree Tech Stealth Cybersecurity Experience in Chicago, cybersecurity expert Anthony Cunha shed light on one of the most pressing issues organizations face today: managing and securing vast amounts of data. Drawing from his experience with Cyera, a…

Keep Reading
Are Security Awareness Training Platforms Really Effective?

In the rapidly changing landscape of cybersecurity the conversation around the effectiveness of security awareness training platforms has never been more important. As organizations pour significant resources into these platforms, the pressing question remains: are they truly effective in addressing…

Keep Reading
Onions have Layers, Ogres have Layers: Anti-Ransomware Strategy

Are you ready for a ransomware attack? Globally, so far in 2024, there have been over 2,000 known ransomware attacks. About half of these attacks were on US-based entities. And the majority of these US-based ransomware attacks were directed toward…

Keep Reading
How to get the most out of Black Hat 2024

Going to conferences has become a regular occurrence for professionals. Within the security space, Black Hat is one of the most well-known and largest conferences, drawing immense crowds each year. In 2023, Black Hat boasted over 22,750 unique attendees. When…

Keep Reading
Are Your Secrets Truly Secret?

Oded Hareven gave a compelling presentation about the future of secrets management at our 2023 Security Summit. What is Akeyless? So, what’s Akeyless all about? Oded gave us the lowdown: Akeyless is a company dedicated to secrets management, which is…

Keep Reading