Perimeter-based security is out. Zero trust is in.

In 3 Tree Tech forum keynote, Brian Wane, CEO of XQ confronted the digital age’s Goliath: sophisticated cybersecurity threats menacing organizations worldwide. Wane’s talk, dubbed “Data vs. Goliath,” didn’t just a focus on vulnerabilities; it was a call for a…

Keep Reading
Landon Lewis Breaks Down Axiom’s Value for CISOs

In his 3 Tree Tech cyber security summit keynote, Landon Lewis of Axiom offered a detailed examination of the evolving landscape of event data management, underlining the challenges and breakthroughs in the field. “In the beginning, we were just modifying…

Keep Reading
A network-centric to browser-centric strategy.

In the never-ending cybersecurity race, the enterprise browser represents a pivotal shift. It addresses the dual challenges of enhancing user experience and bolstering security in an increasingly cloud-centric world. Richard Green of Island spoke at 3 Tree Tech’s most recent…

Keep Reading
Navigating Cybersecurity Challenges with Outsourced Solutions

Cybersecurity outsourcing is a rapidly changing landscape. Small to medium-sized enterprises, such as CPA firms, face the daunting challenge of ensuring robust security without the budget to support extensive in-house teams. Bill Schneller of Geffen Mesher gives a firsthand account…

Keep Reading
Elevating Cybersecurity in a Post-Breach World: Insights from Equifax’s CISO

In a world where digital threats loom large, Dan Dubowski, the Chief Information Security Officer at Equifax, provides a roadmap for navigating cybersecurity’s evolving terrain. Speaking at our recent 3 Tree Tech Forum, his presentation provided rich experience, offering a…

Keep Reading
How to beat threat actors in 2024: superior strategy

Cybersecurity may feel like something new and special, but it’s merely a new application of concepts the world has seen countless times before. Today, security teams can apply ancient lessons from the battlefield to strengthen their cybersecurity programs. Five key…

Keep Reading
How to build a cybersecurity team

Cybersecurity is more warfare than security. At a 3 Tree Tech security event, Michael Meis, Associate CISO of The University of Kansas Health System says if you want to win, you have to think strategically in such a way to…

Keep Reading
Challenges implementing SASE, and better strategies.

In a recent panel discussion at SECtember, industry experts John Spiegel and Jaye Tillson of Axis / HPE joined 3 Tree Tech managing partner, Eric Skeens to discuss the challenges implementing SASE. The trio focused their comments on the evolving…

Keep Reading
Evil IT guy with black leather coat sitting on a throne. (AI generated)
Are CTOs the CX bad guy?

New tools to enhance customer experience (CX) can come with baggage. While well-intentioned CX leaders see a beautiful wooden horse, tech leaders see the fall of Troy and their inevitable beheading. Risk and breaking working systems are concerns. For this…

Keep Reading
How to defend against double extortion

Imagine someone locking you out of your own house, digging through your sensitive documents, and threatening to share this private information unless you pay them an exorbitant amount of money. For tech leaders, this is reality. Are you prepared to defend…

Keep Reading