News

Impacts and applications 1.  Introduction to DORA The Digital Operational Resilience Act (DORA) is a European regulation that ...
The Art and Science of Being a CISO By Ira Winkler, Vice President & Field CISO, CYE Have you ever wondered why people are chosen to become Chief Information Security Officers? I started thinking ...
Next-Generation Data Protection: What Is it? Why Should Enterprise Tech Buyers Care? By Eric Herzog, CMO of Infinidat When a cyberattack happens, such as a ransomware or malware attack, the CEO and ...
Consider a simple HTTPS connection between a user and a website. The secure handshake that protects the session relies on asymmetric key exchange algorithms. These algorithms are resilient today ...
Preparing for the Quantum Age: What Security Leaders Need to Know Now By Jason Rader The race toward quantum computing is accelerating – and the security implications are something we should consider ...
Imagine losing everything in an instant. Not because of a catastrophic hack, but because of a simple click, an AI mistake, or an accidental bulk delete. This isn’t a hypothetical scenario—it’s ...
Information has become the most dangerous currency, and your organization’s leadership is trading it without even knowing. Every tweet, every public record, every casual social media post is a ...
The Volume Problem Security teams are inundated with vulnerabilities. Between scanners, penetration tests, and bug bounty ...
Red Piranha, headquartered in Australia, is a premier developer and manufacturer of cybersecurity technologies and solutions.