CINXE.COM

Cyber Security Review Magazine

<!DOCTYPE html><html><head> <!-- Global site tag (gtag.js) - Google Analytics --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-L20Q02Q39T"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-L20Q02Q39T'); </script> <script async src="https://securepubads.g.doubleclick.net/tag/js/gpt.js"></script> <script> window.googletag = window.googletag || {cmd: []}; googletag.cmd.push(function() { googletag.defineSlot('/196957289/The-Cybersecurity-Review-Newsletter', [468, 60], 'div-gpt-ad-1642400985424-0').addService(googletag.pubads()); googletag.pubads().enableSingleRequest(); googletag.enableServices(); }); </script> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta content="text/html;charset=utf-8" http-equiv="Content-Type"> <meta content="utf-8" http-equiv="encoding"><meta name="yandex-verification" content="e37d35e7cf5d4354" /> <meta name="viewport" content="width=device-width, initial-scale=1"><meta name="google-site-verification" content="FgKKWgsee6DfpbDxTLf1_m_0O8UzahrUuxHitIziwWY" /><meta name="msvalidate.01" content="AE89CFE4B5DC66AAAACE50A16B670390" /> <meta name="robots" content="noodp" /> <link rel="shortcut icon" href="https://www.thecybersecurityreview.com/images/favicon cyber security.png" type="image/x-icon"> <meta name="p:domain_verify" content="a0167bdf1c538d3494bf2f9413ad1808" /> <meta property="og:url" content="https://www.thecybersecurityreview.com/" /> <meta property="og:type" content="website" /> <meta property="og:site_name" content="The Cybersecurity Review"> <meta property="og:title" content="The Cybersecurity Review: Business and Technology Magazine" /> <meta property="og:image" content="https://www.thecybersecurityreview.com/images/logo-cyber.png" /> <meta property="og:description" content="Cyber Security Review is a print and digital magazine that aims to provide cybersecurity ecosystem business and technology best practices to assist an organization to protect themselves from increasing instances and complexity of security breaches." /> <meta name="keywords" content="Cyber Security Review, Cyber Security Review magazine, Cyber Security technology, Cyber security print magazine, Cyber Security digital magazine, cybersecurity magazine , CyberSecurity " /> <title> Cyber Security Review Magazine</title> <meta name="description" content="Cyber Security Review is a print and digital magazine providing cybersecurity solutions to help organizations protect against complex security breaches" /> <!--<link rel="amphtml" href="https://www.thecybersecurityreview.com/">--> <link href="https://www.thecybersecurityreview.com/cssweb/tech_css/jQuery.verticalCarousel.css" rel="stylesheet" type="text/css" /> <link href="https://www.thecybersecurityreview.com/cssweb/tech_css/style.css" rel="stylesheet" type="text/css" /> <link href="https://www.thecybersecurityreview.com/cssweb/bootstrap.css" rel="stylesheet" type="text/css" /><link href="https://www.thecybersecurityreview.com/cssweb/bootsatrap.min_custom.css" rel="stylesheet" type="text/css" /> <link href="https://www.thecybersecurityreview.com/cssweb/font-awesome.min.css" rel="stylesheet" type="text/css" /> <link href="https://www.thecybersecurityreview.com/cssweb/animate.css" rel="stylesheet" type="text/css" /> <link href="https://www.thecybersecurityreview.com/cssweb/owl.carousel.css" rel="stylesheet" type="text/css" /> <link href="https://www.thecybersecurityreview.com/cssweb/owl.theme.default.css" rel="stylesheet" type="text/css" /> <link href="https://www.thecybersecurityreview.com/cssweb/normalize.css" rel="stylesheet" type="text/css" /> <link href="https://www.thecybersecurityreview.com/cssweb/slicknav.min.css" rel="stylesheet" type="text/css" /> <link rel="stylesheet" href="https://www.thecybersecurityreview.com/autopop/css/style1.css" /> <!-- Site CSS --> <link href="https://www.thecybersecurityreview.com/cssweb/main.css" rel="stylesheet" type="text/css" /> <link href="https://www.thecybersecurityreview.com/cssweb/responsive.css" rel="stylesheet" type="text/css" /> <script src="https://www.thecybersecurityreview.com/jsweb/modernizr-3.5.0.min.js"></script> <!--favincon--> <meta name="msapplication-TileColor" content="#ffffff"> <meta name="msapplication-TileImage" content="assets/images/favicon/ms-icon-144x144.png"> <meta name="theme-color" content="#ffffff"> <!-- Google fonts --> <link href="https://fonts.googleapis.com/css?family=IBM+Plex+Serif:300,400,500" rel="stylesheet"> <link href="https://fonts.googleapis.com/css?family=Playfair+Display" rel="stylesheet"> <link href="https://fonts.googleapis.com/css?family=Pacifico" rel="stylesheet" /> <style> /*.owl-carousel .owl-nav.disabled, .owl-carousel .owl-dots.disabled { display: none; }*/ .owl-prev { float: left; background-color: #ddd; padding-left: 5px; padding-right: 5px; padding-bottom: 4px; } .owl-next { float: right; background-color: #ddd; padding-left: 5px; padding-right: 5px; padding-bottom: 4px; } #slider-small .owl-nav{left:8px !important;} .pagination {text-align: center;}.breadcrumb-selected { color: #000000;}.breadcrumb-selected a{ color: #0079bb;}a {outline: 0 none !important;text-decoration:none !important;}.border{padding:1px;background:linear-gradient(110deg,#aeb6ac 33%,rgba(0,0,0,0) 33%),linear-gradient(110deg,#000 35%,#aeb6ac 35%);background-size:400% 400%;height:Auto;background-position:13% 43%;-moz-animation:Gradient 5s ease infinite;float:left}.inner-cutout{padding:1px 0;display:block;background-color:#fff!important;margin:2px;padding-bottom:4px;height:auto;background:radial-gradient(#fff,#fff);background-size:300%;background-position:50% 50%}.knockout{vertical-align:middle;text-align:center;font-family:Pacifico,cursive;color:#fff;background:linear-gradient(110deg,#12741a 33%,rgba(0,0,0,0) 33%),linear-gradient(110deg,#000 34%,#12741a 34%);background-size:400%;-webkit-text-fill-color:transparent;-webkit-background-clip:text}.knockout{animation:Gradient 5s ease infinite;-webkit-animation:Gradient 15s ease infinite;-moz-animation:Gradient 5s ease infinite}.close-thanks{cursor:pointer;position:relative;top:0;right:0;transform:translate(0,-50%);left:6px;background-color:#007205;border-radius:50%;width:18px;height:21px;text-align:center;float:right!important;font-size:20px!important;font-weight:200!important;line-height:1;color:#fff!important;text-shadow:0 1px 0 #fff!important;opacity:1!important}.close:hover{background:#bbb}@-webkit-keyframes Gradient{0%{background-position:30% 50%}50%{background-position:25% 50%}100%{background-position:30% 50%}} </style> <script async src="https://securepubads.g.doubleclick.net/tag/js/gpt.js"></script> <script> window.googletag = window.googletag || {cmd: []}; googletag.cmd.push(function() { googletag.defineSlot('/196957289/ManageHRMag_Right', [260, 240], 'div-gpt-ad-1574828316722-0') .addService(googletag.pubads()); googletag.pubads().enableSingleRequest(); googletag.enableServices(); }); </script> <script> window.googletag = window.googletag || {cmd: []}; googletag.cmd.push(function() { var adSlot = googletag.defineSlot('/196957289/CybersecurityReview', [728, 180], 'div-gpt-ad-1582787013011-0') .addService(googletag.pubads()); googletag.pubads().enableSingleRequest(); googletag.enableServices(); googletag.pubads().addEventListener('slotRenderEnded', function(event) { if (event.slot === adSlot && !event.isEmpty) {document.getElementById('div-gpt-ad-1582787013011-0').style.display = 'block'; } else { document.getElementById('div-gpt-ad-1582787013011-0').style.display = 'none';document.getElementById('ads-mobile-client-new').style.display = 'block';} });}); </script> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script> <script> (adsbygoogle = window.adsbygoogle || []).push({ google_ad_client: "ca-pub-5965893319682433", enable_page_level_ads: true }); </script> <style> .closee { position: absolute; top: 50%; right: 0%; transform: translate(0%, -50%); display: block; padding: 4px 8px; min-width: 100px; margin-left: 5px; border-radius: 5px; cursor: pointer; color: rgb(0, 0, 0); text-align: center; background-color: #ddd; margin-right: 30px; } .closee:hover {background: #bbb;} .footer { position: relative; left: 0; bottom: 0; width: 100%; color: white; text-align: left; z-index: 999999999; background: rgb(79, 87, 96) none repeat scroll 0% 0%; padding-left: 15px; } .truncate4l { display: -webkit-box; -webkit-line-clamp: 4; -webkit-box-orient: vertical; overflow: hidden; text-overflow: ellipsis; max-height: unset; } .truncate6l { display: -webkit-box; -webkit-line-clamp: 6; -webkit-box-orient: vertical; overflow: hidden; text-overflow: ellipsis; max-height: unset; } .truncate3l { display: -webkit-box; -webkit-line-clamp: 3; -webkit-box-orient: vertical; overflow: hidden; text-overflow: ellipsis; max-height: unset; } .truncate2l { display: -webkit-box; -webkit-line-clamp: 2; -webkit-box-orient: vertical; overflow: hidden; text-overflow: ellipsis; max-height: unset; } .truncate1l { display: -webkit-box; -webkit-line-clamp: 1; -webkit-box-orient: vertical; overflow: hidden; text-overflow: ellipsis; max-height: unset; } </style> <script> function set_cookie() { $("#footerr").hide(); var cookieName = 'thecybersecurityreview'; var cookieValue = 'thecybersecurityreview'; var myDate = new Date(); myDate.setMonth(myDate.getMonth() + 120); document.cookie = cookieName + "=" + cookieValue + ";expires=" + myDate + ";domain=.thecybersecurityreview.com;path=/"; } </script> <!-- Start Alexa Certify Javascript --> <script type="text/javascript"> _atrk_opts = { atrk_acct: "XvKix13WSM20Ao", domain: "thecybersecurityreview.com", dynamic: true }; (function() { var as = document.createElement('script'); as.type = 'text/javascript'; as.async = true; as.src = "https://certify-js.alexametrics.com/atrk.js"; var s = document.getElementsByTagName('script')[ 0]; s.parentNode.insertBefore(as, s); })(); </script> <noscript><img src="https://certify.alexametrics.com/atrk.gif?account=XvKix13WSM20Ao" style="display:none" height="1" width="1" alt="" /></noscript> <!-- End Alexa Certify Javascript --> <script data-ad-client="ca-pub-5965893319682433" async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script> </head> <body oncopy="return OnCopy ();"> <div id="wrapper"><input type="hidden" value="APAC" class="region_val" id="region_val"> <div id="sidebar-wrapper"><div class="sidebar-inner"><div class="off-canvas-close"><span>CLOSE</span></div><div class="sidebar-widget"><div class="widget-title-cover"><h4 class="widget-title"><span>Specials</span></h4></div><ul class="menu" id="sidebar-menu"> <li class="menu-item "><a href="https://security-awareness-training.thecybersecurityreview.com/">Security Awareness Training</a></li> <li class="menu-item "><a href="https://security-advisory-services.thecybersecurityreview.com/">Security Advisory Services </a></li> <li class="menu-item "><a href="https://cyber-security-canada.thecybersecurityreview.com/">Cyber Security Canada</a></li> <li class="menu-item "><a href="https://penetration-testing.thecybersecurityreview.com/">Penetration Testing</a></li> <li class="menu-item "><a href="https://virtual-ciso.thecybersecurityreview.com/">Virtual CISO</a></li> <li class="menu-item "><a href="https://xdr-and-mdr-europe.thecybersecurityreview.com/">XDR and MDR Europe</a></li> <li class="menu-item "><a href="https://security-advisory-services-apac.thecybersecurityreview.com/">Security Advisory Services APAC</a></li> <li class="menu-item "><a href="https://sonicwall.thecybersecurityreview.com/">Sonicwall</a></li> <li class="menu-item "><a href="https://penetration-testing-apac.thecybersecurityreview.com/">Penetration Testing APAC</a></li> <li class="menu-item "><a href="https://ai-in-cybersecurity-apac.thecybersecurityreview.com/">AI In Cybersecurity APAC</a></li> <li class="menu-item "><a href="https://security-ai.thecybersecurityreview.com/">Security AI</a></li> </ul></div> </div> </div> <div id="page-content-wrapper"> <link href="/cssweb/new_region.css" rel="stylesheet"> <script> function readCookie(name) { var nameEQ = name + "="; var ca = document.cookie.split(';'); for (var i = 0; i < ca.length; i++) { var c = ca[i]; while (c.charAt(0) == ' ') c = c.substring(1, c.length); if (c.indexOf(nameEQ) == 0) return c.substring(nameEQ.length, c.length); } return null; } function googleTranslateElementInit() { var value = readCookie('countrycode'); if (value == 'Europe') { /*value_cook = 'en,fr,ro,hu,de,ru,es,tr,it,bg';*/ value_cook='en,de,fr,ro,it,nl,es,tr,sv,fi,pt,no,da,pl,cs,el';} else if (value == 'APAC') { value_cook = 'en,zh-TW,ja,ko,tl,vi,th'; } else if (value == 'CANADA') { value_cook = 'en,fr'; } new google.translate.TranslateElement({ pageLanguage: 'auto', includedLanguages: value_cook, layout: google.translate.TranslateElement.InlineLayout.SIMPLE, autoDisplay: true }, 'google_translate_element'); } </script> <script src="https://translate.google.com/translate_a/element.js?cb=googleTranslateElementInit"></script> <link rel="stylesheet" href="https://www.thecybersecurityreview.com/cssweb/font-awesome.min.css"> <style> .dropdown-menu{font-weight: normal !important;} .search{position:relative;display: inline-block;} .searching{background: #ee2e2c;color:#fff;border-radius:0px;display:inline-block;padding:6px 7px 7px;font-size:18px;text-shadow:1px 1px 2px #21638F;box-shadow: inset 0px 0px 0px #21638F;transition:all 0.5s ease;-webkit-transition:all 0.5s ease;cursor: pointer;z-index:10;position:relative;vertical-align: top;height:38px;} .searching:hover{background: #ee2e2c;text-shadow:0px 0px 0px #21638F;box-shadow: inset 0px 0px 8px #21638F;transition:all 0.5s ease;-webkit-transition:all 0.5s ease;} .search_form{background: #4f5760;position:absolute;z-index:0;padding:0px 5px;right:0;top:15px;overflow: hidden;border-radius:0px;width: 20px;height:0px;transition: height 0.2s ease-out 0.5s , top 0.2s ease-out 0.5s, padding 0.2s ease-out 0.5s, width 0.3s ease-out 0.2s;-webkit-transition: height 0.2s ease-out 0.5s , top 0.2s ease-out 0.5s, padding 0.2s ease-out 0.5s, width 0.3s ease-out 0.2s;} .search_form form{opacity:0;transition:all 0.3s ease-out;-webkit-transition:all 0.3s ease-out;} .search_form input{background:#fff;border:none;color: #000;font-weight: bold;vertical-align: top} .search_form input[type='text']{width: 140px;margin: 0px 0px 0px 0;padding: 0px 5px 1px;min-height: 24px;font-size: 11px;height:22px;} .search_form input[type='submit']{text-transform: uppercase;font-size: 11px;padding: 0px 5px;min-height: 24px;margin: 0px 0px 0px 0;cursor: pointer;background-color: #4f5760;color: #fff;} .search_box{visibility: hidden;} .search_box:checked~.search_form{width: 213px;height: 32px;padding: 4px;top: 35px;transition: height 0.2s ease-out, top 0.2s ease-out, padding 0.2s ease-out, 0.3s width ease-out 0.2s;-webkit-transition: height 0.2s ease-out, top 0.2s ease-out, padding 0.2s ease-out, 0.3s width ease-out 0.2s;} .search_box:checked~.search_form form{opacity:1;transition:0.3s all ease-out 0.5s;-webkit-transition:0.3s all ease-out 0.5s;} .active{color: #e5633f;}.main_nav_cover {font-weight: bold !important;} .main_nav_cover #main-menu li { padding: 0 11px !important; float: left !important; } @media screen and (min-width: 1025px) and (max-width: 1200px) { .main_nav_cover #main-menu li{padding: 0 5px !important;} } @media screen and (min-width: 992px) and (max-width: 1200px) { #header_new{width:auto !important;} } .main_nav_cover #main-menu li a { font-size: 15px !important;} @media screen and (min-width: 320px) and (max-width: 991px) { #advert{display: none;} } @media (min-width: 1024px) and (max-width: 2500px) { #region { left: 0px !important; } } .logo__btn{display:block ruby;justify-content:space-between;height:15px;margin-top:0;margin-bottom:0;width:100%;top:5px;position:relative}.logo__btn .col-md-3{float:left}.logo__btn__item{padding-bottom:0;vertical-align:top;text-align:center;background-color:#272727;padding-left:5px!important;text-align:center;line-height:15px;padding-left:5px!important;padding-right:0;padding-right:10px}.logo__btn__item a{line-height:120%;font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif;font-size:11px;display:inline-block;text-align:center;vertical-align:top;color:#fff;padding-top:1px}.logo__btn__item.active,.logo__btn__item:hover{background-color:#ed1c24}.logo__btn__item{vertical-align:top;text-align:center;background-color:#272727;padding-left:10px;padding-right:10px}.logo__btn__item a{line-height:120%;font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif;font-size:11px;display:inline-block;text-align:center;vertical-align:top;color:#fff} .custom-select { position: relative; font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif; font-weight: 700; margin-left: 50px; padding: none !important; } .custom-select select { display: none; } a.nav-link dropdown-toggle { padding-left: 0rem; padding-right: 0rem; padding-top: 0px; padding-bottom: 0px; } .select-items div, .select-selected { color: #000; padding: 5px 5px; border: 1px solid transparent; border-top-color: transparent; border-right-color: transparent; border-bottom-color: transparent; border-left-color: transparent; border-color: transparent transparent rgba(0, 0, 0, 0.1) transparent; cursor: pointer; user-select: none; } .select-selected { background-color: #f3f3f3 !important; width: 110px; } .select-selected::after { position: absolute; content: ""; top: 16px; right: -40px; width: 0; height: 0; border: 6px solid transparent; border-top-color: transparent; border-right-color: transparent; border-bottom-color: transparent; border-left-color: transparent; border-color: #000 transparent transparent transparent; } .select-hide { display: none; } .select-items { position: absolute; background-color: #f3f3f3; top: 100%; left: 0; right: 0; z-index: 99; width: 110px; } #cssmenu ul ul li a { background: #0f50a3 !important; } .goog-te-gadget-simple .VIpgJd-ZVi9od-xl07Ob-lTBxed span { text-decoration: none; font-size: x-small; } .skiptranslate.goog-te-gadget { margin-top: -6px !important; } @media screen and (max-width:1199px) { #advert { display: none; } }@media screen and (max-width: 1024px) { .slicknav_nav {overflow: scroll;margin-bottom: 10px;height: 350px;}} </style> <style> .dropdown-hover:hover>.dropdown-menu { display: inline-block; } .dropdown-hover>.dropdown-toggle:active { pointer-events: none; } @media screen and (max-width:1024px) { .dropdown-menu { position: relative !important; }.mob_reg li a{color: #000 !important;font-size: 13px;} } .skiptranslate.goog-te-gadget { position: relative !important; top: -7px !important; margin: 0 !important;}.VIpgJd-ZVi9od-xl07Ob-lTBxed { top: -8px !important;}#\:0\.targetLanguage { height: 30px !important;}.goog-te-gadget-icon { display: none;} </style> <style> div#APAC { display: none; } </style> <div class="container-fluid"> <div class="container"> <div class="row"> <div class="col-12 col-md-12 header" style="display:flex;"> <div id="header_new" class="col-lg-2 col-md-3 col-sm-4 col-xs-6" style="float: left;margin-top: 15px;padding-left: 0;text-align: left;"> <p class="logo"><a href="https://www.thecybersecurityreview.com" style="font-weight: 700;"><img src="/images/logo-cyber.png" style="width: 170px;" title ="The Cybersecurity Review" alt="The Cybersecurity Review"></a></p> <div style="padding-left: 0px;margin-top: 0px;margin-left: 0px;padding-top: 0px;" class="col-md-12"> </div> </div> <div class="col-lg-8 col-md-7 col-sm-5 col-xs-2"> <div id="advert" style="width:728px; /*height:90px;*/ margin:0 auto; margin-top:0px; position:relative;float: right;"> <div id='div-gpt-ad-1582787013011-0' style='width: 728px; height: 180px;'> <script> googletag.cmd.push(function() { googletag.display('div-gpt-ad-1582787013011-0'); }); </script> </div><div id='ads-mobile-client-new' style='min-width: 728px; min-height: 90px;display:none'> <a href="https://www.securityhq.com/services/managed-detection-and-response/?utm_source=thecybersecurityreview&utm_medium=banner&utm_campaign=ibm-q3-funds-2022&utm_content=728x180 "> <div> <img style="padding-bottom: 14px;" alt="img" src="https://www.thecybersecurityreview.com/images/static_ads.png"></div> </a> </div> </div> </div> <div id="sitemap" class="col-lg-2 col-md-2 col-sm-2 col-xs-4" style="padding-left: 0;padding-right: 0;left: 0px;text-align: center;float: left;padding-top: 10px;"> <a href="https://www.thecybersecurityreview.com/advertise-with-us/" style=""><img class="advertise_img" alt="thecybersecurityreview" style="" src="https://www.thecybersecurityreview.com/images/Artboard_7.jpg"> </a> </div> </div> </div> </div></div><div class="main-nav section_margin"> <div class="container-fluid"> <div class="container"> <div class="row"> <div class="col-12 col-md-12 main_nav_cover notranslate" id="nav"> <ul id="main-menu"> <li><a class="active" href="https://www.thecybersecurityreview.com">Home</a> </li> <li class="nav-item dropdown dropdown-hover position-static"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdown" role="button" data-mdb-toggle="dropdown" aria-expanded="false" style="padding-left: 0rem; padding-right: 0rem; padding-top: 0px; padding-bottom: 0px;"> Specials </a> <div class=" col-md-3 dropdown-menu w-100 mt-0" aria-labelledby="navbarDropdown" style="border-top-left-radius: 0;border-top-right-radius: 0;"> <div class="col-md-12"> <style> .mybox1, .mybox2 { display: none; } .read-more { padding: 6px; font-size: 14px; font-weight: 700; color: rgb(5, 14, 5); background-color: rgb(242, 242, 242); margin-top: 0px; border: 1px solid #ddd; text-align: center; width: 100%; } .arrowBox { position: relative; width: 100%; background: #194ba0; ; height: 40px; line-height: 25px; margin-bottom: 30px; text-align: center; color: #fff; } .arrowBox a { color: #fff; } .arrow-bottom:after { position: absolute; bottom: -30px; left: 50%; margin-left: -30px; content: ""; display: block; border-left: 30px solid transparent; border-right: 30px solid transparent; border-top: 30px solid #194ba0; ; } @media screen and (min-width:1700px) { .exta-screen-vertical { display: block!important } .small-screen-vertical { display: none!important } } .meta1 { font-family: lab-grotesque-black, HelveticaNeue-Bold, "Helvetica Neue Bold", "Helvetica Neue", Helvetica, Arial, "Lucida Grande", sans-serif; } </style> <div class="containet_new exta-screen-vertical" style="position: relative;z-index: 999999;background: white;display:none"> <div class="row new_row"> <div class=" col-md-12 col-lg-12 mb-lg-0" style="/*padding-left: 0px;padding-right: 0px;background: white;*/"> <div class=" list-group-flush" style="margin-bottom: 3px;"> <a href="https://penetration-testing.thecybersecurityreview.com/" class="list-group-item list-group-item-action meta1" style="font-size: 13px !important;text-transform: none;;border-bottom: 1px solid #ddd;padding: 6px !important;color:#000;font-weight:500;;">Penetration Testing</a> </div> </div> <div class=" col-md-12 col-lg-12 mb-lg-0" style="/*padding-left: 0px;padding-right: 0px;background: white;*/"> <div class=" list-group-flush" style="margin-bottom: 3px;"> <a href="https://security-advisory-services.thecybersecurityreview.com/" class="list-group-item list-group-item-action meta1" style="font-size: 13px !important;text-transform: none;;border-bottom: 1px solid #ddd;padding: 6px !important;color:#000;font-weight:500;;">Security Advisory Services</a> </div> </div> <div class=" col-md-12 col-lg-12 mb-lg-0" style="/*padding-left: 0px;padding-right: 0px;background: white;*/"> <div class=" list-group-flush" style="margin-bottom: 3px;"> <a href="https://security-ai.thecybersecurityreview.com/" class="list-group-item list-group-item-action meta1" style="font-size: 13px !important;text-transform: none;;border-bottom: 1px solid #ddd;padding: 6px !important;color:#000;font-weight:500;;">Security AI</a> </div> </div> <div class=" col-md-12 col-lg-12 mb-lg-0" style="/*padding-left: 0px;padding-right: 0px;background: white;*/"> <div class=" list-group-flush" style="margin-bottom: 3px;"> <a href="https://security-awareness-training.thecybersecurityreview.com/" class="list-group-item list-group-item-action meta1" style="font-size: 13px !important;text-transform: none;;border-bottom: 1px solid #ddd;padding: 6px !important;color:#000;font-weight:500;;">Security Awareness Training</a> </div> </div> <div class=" col-md-12 col-lg-12 mb-lg-0" style="/*padding-left: 0px;padding-right: 0px;background: white;*/"> <div class=" list-group-flush" style="margin-bottom: 3px;"> <a href="https://sonicwall.thecybersecurityreview.com/" class="list-group-item list-group-item-action meta1" style="font-size: 13px !important;text-transform: none;;border-bottom: 1px solid #ddd;padding: 6px !important;color:#000;font-weight:500;;">Sonicwall</a> </div> </div> <div class=" col-md-12 col-lg-12 mb-lg-0" style="/*padding-left: 0px;padding-right: 0px;background: white;*/"> <div class=" list-group-flush" style="margin-bottom: 3px;"> <a href="https://virtual-ciso.thecybersecurityreview.com/" class="list-group-item list-group-item-action meta1" style="font-size: 13px !important;text-transform: none;;border-bottom: 1px solid #ddd;padding: 6px !important;color:#000;font-weight:500;;">Virtual CISO</a> </div> </div> </div> <div class="mybox"> <span class="mybox2" id="mybox2id"> <div class="row new_row" style="" > </div> </span></div> </div> <div class="containet_new small-screen-vertical" style="position: relative;z-index: 999999;background: white;"> <div class="row new_row"> <div class=" col-md-12 col-lg-12 mb-lg-0" style="/*padding-left: 0px;padding-right: 0px;background: white;*/"> <div class=" list-group-flush" style="margin-bottom: 3px;"> <a href="https://penetration-testing.thecybersecurityreview.com/" class="list-group-item list-group-item-action meta1" style="font-size: 13px !important;text-transform: none;;border-bottom: 1px solid #ddd;padding: 6px !important;color:#000;font-weight:500;;">Penetration Testing</a> </div> </div> <div class=" col-md-12 col-lg-12 mb-lg-0" style="/*padding-left: 0px;padding-right: 0px;background: white;*/"> <div class=" list-group-flush" style="margin-bottom: 3px;"> <a href="https://security-advisory-services.thecybersecurityreview.com/" class="list-group-item list-group-item-action meta1" style="font-size: 13px !important;text-transform: none;;border-bottom: 1px solid #ddd;padding: 6px !important;color:#000;font-weight:500;;">Security Advisory Services</a> </div> </div> <div class=" col-md-12 col-lg-12 mb-lg-0" style="/*padding-left: 0px;padding-right: 0px;background: white;*/"> <div class=" list-group-flush" style="margin-bottom: 3px;"> <a href="https://security-ai.thecybersecurityreview.com/" class="list-group-item list-group-item-action meta1" style="font-size: 13px !important;text-transform: none;;border-bottom: 1px solid #ddd;padding: 6px !important;color:#000;font-weight:500;;">Security AI</a> </div> </div> <div class=" col-md-12 col-lg-12 mb-lg-0" style="/*padding-left: 0px;padding-right: 0px;background: white;*/"> <div class=" list-group-flush" style="margin-bottom: 3px;"> <a href="https://security-awareness-training.thecybersecurityreview.com/" class="list-group-item list-group-item-action meta1" style="font-size: 13px !important;text-transform: none;;border-bottom: 1px solid #ddd;padding: 6px !important;color:#000;font-weight:500;;">Security Awareness Training</a> </div> </div> <div class=" col-md-12 col-lg-12 mb-lg-0" style="/*padding-left: 0px;padding-right: 0px;background: white;*/"> <div class=" list-group-flush" style="margin-bottom: 3px;"> <a href="https://sonicwall.thecybersecurityreview.com/" class="list-group-item list-group-item-action meta1" style="font-size: 13px !important;text-transform: none;;border-bottom: 1px solid #ddd;padding: 6px !important;color:#000;font-weight:500;;">Sonicwall</a> </div> </div> <div class=" col-md-12 col-lg-12 mb-lg-0" style="/*padding-left: 0px;padding-right: 0px;background: white;*/"> <div class=" list-group-flush" style="margin-bottom: 3px;"> <a href="https://virtual-ciso.thecybersecurityreview.com/" class="list-group-item list-group-item-action meta1" style="font-size: 13px !important;text-transform: none;;border-bottom: 1px solid #ddd;padding: 6px !important;color:#000;font-weight:500;;">Virtual CISO</a> </div> </div> </div> <div class="mybox"><span class="mybox1 row" id="mybox1id" style=" display: none !important;"> <div class="row new_row" style="margin-left: 0px;"> </div> <div class="row new_row" style="margin-left: 0px;"> </div> </span></div> </div> <script> function changeReadMore() { const mycontent = document.getElementById('mybox1id'); const mybutton = document.getElementById('mybuttonid'); if (mycontent.style.display === 'none' || mycontent.style.display === '') { mycontent.style.setProperty('display', 'block', 'important'); mybutton.textContent = 'Read Less'; } else { mycontent.style.setProperty('display', 'none', 'important'); mybutton.textContent = 'Read More'; } } </script> <script> function changeReadMore1() { const mycontent2 = document.getElementById('mybox2id'); const mybutton2 = document.getElementById('mybuttonid2'); if (mycontent2.style.display === 'none' || mycontent2.style.display === '') { mycontent2.style.display = 'block'; mybutton2.textContent = 'Read Less'; } else { mycontent2.style.display = 'none'; mybutton2.textContent = 'Read More'; } } </script> </div> </div> </li> <li><a href="https://www.thecybersecurityreview.com/contributors/" >Contributors</a> </li> <li><a href="https://www.thecybersecurityreview.com/vp/" ><i aria-hidden="true" style="width:15px;padding-left: 0;font-size:13px;"></i>Vendors</a></li> <li><a href="https://www.thecybersecurityreview.com/news/" >News</a> </li> <li><a href="https://www.thecybersecurityreview.com/conference/" >Conferences</a> </li> <li><a href="https://www.thecybersecurityreview.com/awards/" ><i aria-hidden="true" class="fa fa-trophy" style="width:15px;padding-left: 0;font-size:13px;"></i>awards</a></li> <li id="region" style="float:right !important;display:flex;flex-direction:row-reverse margin-left: 252px; left: 266px;border-bottom: none;"> <div class="" id="cssmenu" style="z-index: 99999;margin-top: 0px!important;float: right;height:37px;"> <ul class="nav navbar-nav "> <li class="active1 has-sub" style="margin-left: 0px !important;margin-right: 0px !important;"><span class="submenu-button"></span><span class="submenu-button"></span><a href="#" style="padding: 13px 0px !important;font-size: 13px!important;height: 37px;">APAC</a> <ul class="mob_reg"> <li id="home_top_id" ><a style="cursor: pointer;" onclick="return createCookieNew('US');" >US</a></li> <li id="europe_top_id" ><a style="cursor: pointer;" onclick="return createCookieNew('EUROPE');" >EUROPE</a> </li> <li id="canada_top_id" ><a style="cursor: pointer;" onclick="return createCookieNew('CANADA');" >CANADA</a> </li><li id="apac_top_id" style="display: none!important;" ><a style="cursor: pointer;" onclick="return createCookieNew('APAC');" >APAC</a> </li> </ul> </li> </ul> </div> <div class=" search"> <input class="search_box" id="search_box" style="margin-top: 11px;" type="checkbox"> <label class="icon-search searching" for="search_box" style="width: 36px;"></label> <div class="search_form" style="margin-top: 2px;z-index: 9;"> <form class="form-wrapper-2 cf" method="post" action="/searchnews.php" id="searchform" autocomplete="off" style="display: inline-block;position: relative;z-index: 99;"> <input type="text" placeholder="Search here..." id="newssearchval" name="newssearchval" class="ft" onfocus="if(this.value=='Search') this.value='';" onblur="if(this.value=='') this.value='Search';" value=""><input value="search" type="submit" class="fs" id="newssearchval_button"> </form> </div> </div> </li> <li style="margin-top: 10px; position: relative;float: right !important;"> <div class="lang_sel" style="float:right;; z-index: 10;"> <div class="lang_tab" id="google_translate_element" style="text-align: right; margin-left: 5px;"></div> </div></li> </ul> </div> </div> </div> </div></div> <script type='text/javascript'> function createCookieNew(reg) { if (reg == 'US') { $.cookie('countrycode', 'US', { expires: 1, path: '/', domain: '.thecybersecurityreview.com' }); window.location.href = 'https://www.thecybersecurityreview.com'; location.reload(); window.location.href = "https://www.thecybersecurityreview.com"; } else if (reg == 'APAC') { $.cookie('countrycode', 'APAC', { expires: 1, path: '/', domain: '.thecybersecurityreview.com' }); window.location.href = 'https://www.thecybersecurityreview.com'; location.reload(); window.location.href = "https://www.thecybersecurityreview.com"; } else if (reg == 'EUROPE') { $.cookie('countrycode', 'Europe', { expires: 1, path: '/', domain: '.thecybersecurityreview.com' }); window.location.href = 'https://www.thecybersecurityreview.com'; location.reload(); window.location.href = "https://www.thecybersecurityreview.com"; } else if (reg == 'CANADA') { $.cookie('countrycode', 'CANADA', { expires: 1, path: '/', domain: '.thecybersecurityreview.com' }); window.location.href = 'https://www.thecybersecurityreview.com'; location.reload(); window.location.href = "https://www.thecybersecurityreview.com"; } } </script> <script> var x, i, j, l, ll, selElmnt, a, b, c; x = document.getElementsByClassName("custom-select"); l = x.length; for (i = 0; i < l; i++) { selElmnt = x[i].getElementsByTagName("select")[0]; ll = selElmnt.length; a = document.createElement("DIV"); a.setAttribute("class", "select-selected"); a.innerHTML = selElmnt.options[selElmnt.selectedIndex].innerHTML; x[i].appendChild(a); b = document.createElement("DIV"); b.setAttribute("class", "select-items select-hide"); for (j = 1; j < ll; j++) { c = document.createElement("DIV"); c.innerHTML = selElmnt.options[j].innerHTML; if (selElmnt.options[j].innerHTML == 'APAC') { c.setAttribute("id", 'APAC'); } else { c.setAttribute("id", selElmnt.options[j].innerHTML); } c.addEventListener("click", function(e) { var y, i, k, s, h, sl, yl; s = this.parentNode.parentNode.getElementsByTagName("select")[0]; sl = s.length; h = this.parentNode.previousSibling; createCookieNew(this.innerHTML); for (i = 0; i < sl; i++) { if (s.options[i].innerHTML == this.innerHTML) { s.selectedIndex = i; h.innerHTML = this.innerHTML; y = this.parentNode.getElementsByClassName("same-as-selected"); yl = y.length; for (k = 0; k < yl; k++) { y[k].removeAttribute("class"); } this.setAttribute("class", "same-as-selected"); break; } } h.click(); }); b.appendChild(c); } x[i].appendChild(b); a.addEventListener("click", function(e) { e.stopPropagation(); closeAllSelect(this); this.nextSibling.classList.toggle("select-hide"); this.classList.toggle("select-arrow-active"); }); } function closeAllSelect(elmnt) { var x, y, i, xl, yl, arrNo = []; x = document.getElementsByClassName("select-items"); y = document.getElementsByClassName("select-selected"); xl = x.length; yl = y.length; for (i = 0; i < yl; i++) { if (elmnt == y[i]) { arrNo.push(i) } else { y[i].classList.remove("select-arrow-active"); } } for (i = 0; i < xl; i++) { if (arrNo.indexOf(i)) { x[i].classList.add("select-hide"); } } } document.addEventListener("click", closeAllSelect); </script> <script>const searchIcon = document.querySelector('.searching');const checkbox = document.querySelector('#search_box');searchIcon.addEventListener('click', () => {if(!checkbox.checked){checkbox.checked = true; }else{ checkbox.checked = !checkbox.checked; }});</script> <script src="https://ajax.googleapis.com/ajax/libs/jquery/3.6.4/jquery.min.js"></script><script>$(document).ready(function(){ var x = document.querySelector('.search_box'); var divs = document.querySelector('.lang_tab'); x.setAttribute('id','search_box'); if (window.innerWidth <= 1024) {divs.setAttribute('id', 'google_translate_element'); } });</script><script src="https://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js" type="text/javascript"></script><script src="https://www.thecybersecurityreview.com/header/js/search.js"></script><script src="https://www.thecybersecurityreview.com/header/js/jolly-menu.js"></script> <style>@import url('https://fonts.googleapis.com/css?family=Tajawal');@import url('https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css');.modal-title {margin: 0;line-height: 1.42857143;color: #337ab7;font-weight: 300;text-transform: uppercase;font-size: 20px;font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif !important;text-align: center;}.btn { display: inline-block !important; margin-bottom: 20px !important;position: relative !important;border-radius: 0 !important;padding: 6px 12px !important;font-size: 13px !important;line-height: 1.42857143 !important;width:auto !important;height: 30px;}.form-control {border-radius: 0px !important;font-size: 13px;border: 1px solid #ccc;width: 206px !important;height: 30px;min-height: 34px;}#subscribeModal .modal-content{overflow:hidden;}#clse { } #popup-container { background-color: transparent; border: 5px solid transparent; }.close:hover { background: none;}@media only screen and (min-width:320px) and (max-width:600px){#email{margin-left: 0px;}} #popup-container .modal-lg{width:auto !important;}.mypop p{color: #444;font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif !important;margin: 10px 0;}@media only screen and (min-width: 600px) and (max-width: 1500px){#email{margin-left: 30px;}#sb{margin-top: 0px;}#sm{margin-left: 0px;}}</style> <div id="popup-container" class="mypop"> <div class="modal-dialog"><div class="modal-content"><div class="modal-header" style="border: 11px solid #ddd;border-bottom: 0px solid #ddd;padding-top: 0;padding-bottom: 0;"><div class="modal-title"><div class="row" style="text-align: center;"><div style="color: #000;text-align: center;" class="col-md-11"><a href="#"><img src="/images/logo-cyber.png" class="img-wid" alt="#" title="#" style="padding: 10px;width: 50%;margin-left: 30px;"></a> </div> <a class="close" id="clse">×</a><div class="col-md-11" style="text-align: center;"><p style="font-size: 20px;font-weight: 700;font-style: italic;text-transform: initial;text-align: center;">Weekly Brief</p></div></div> </div> </div><div class="modal-body" style="border: 11px solid #dddddde6;border-top: 1px solid #ddd;padding-top: 0;padding-bottom: 0;"><p style="padding-bottom: 5px;font-weight: 600;font-size: 13px;line-height: 25px;text-align: center;font-style: italic;">Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from The Cyber Security Review </p><div class="row"><div class="col-md-12"><form id="popup_nl"> <div class="row"> <div class="col-md-1"></div> <div class="col-md-5"><div class="form-group" style="float: left;margin-bottom: 5px;margin-left: 0%;"><input type="email" class="form-control" placeholder=" Subscribe to Email Newsletter" id="email" style="border-color: gray;height: 34px;"></div></div><div class="col-md-1"></div> <div class="col-md-5" style=""><a href="javascript:;" onclick="newsletterpop();" id="sb" class="btn btn-primary" style="margin-bottom: 15px !important;">Subscribe</a> </div></div><p id="sm" style="float: left;"></p><p id="picoutput"></p><center><img src="https://www.thecybersecurityreview.com/images/load.gif" alt="loading" style="display:none;" id="load" width="35px" height="35px"></center></form></div></div></div></div></div></div> <script type="text/javascript">var idleTime = 0;$(document).ready(function () { var idleInterval = setInterval(timerIncrement, 1000); $(this).mousemove(function (e) { idleTime = 0; }); $(this).keypress(function (e) { idleTime = 0; });});function timerIncrement() { idleTime = idleTime + 1; if (idleTime > 60) { $("#active-popup").hide(); $("#popup-container").hide(); }}</script> <script type="text/javascript"> $(document).ready(function(){ $("#clse").click(function(){ $("#popup-container").hide(); }) }) document.getElementById('email').addEventListener('keypress', function(event) { if (event.keyCode == 13) { event.preventDefault(); $('#sb').trigger('click'); } }); function newsletterpop() { var email=$("#email").val(); var source_site = document.referrer; var source_form = 'NL_Popup'; var landing_page = window.location.href; var rej_cookie = $.cookie("reject"); var filter =/^(([^<>()\[\]\\.,;:\s@']+(\.[^<>()\[\]\\.,;:\s@']+)*)|('.+'))@((\[[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\])|(([a-zA-Z\-0-9]+\.)+[a-zA-Z]{2,}))$/; if (!filter.test(email)) { $("#sm").css({"color": "#bf0a0abd", "font-family":" 'Helvetica Neue',Helvetica,Arial,sans-serif"}).text("Please provide a valid email address."); $('#email').css({"border-color" : "#ef5d7a"}).focus(); return false; } var emaillist = ["notexisttopreventanyerror.com","aol.com", "att.net", "comcast.net", "facebook.com", "gmail.com", "gmx.com", "googlemail.com", "google.com", "hotmail.com", "hotmail.co.uk", "mac.com", "me.com", "mail.com", "msn.com", "live.com", "sbcglobal.net", "verizon.net", "yahoo.com", "yahoo.co.uk", "email.com", "games.com" , "gmx.net", "hush.com", "hushmail.com", "icloud.com", "inbox.com", "lavabit.com", "love.com", "outlook.com", "pobox.com", "rocketmail.com", "safe-mail.net", "wow.com", "ygm.com", "ymail.com", "zoho.com", "fastmail.fm", "yandex.com","iname.com", "bellsouth.net", "charter.net", "cox.net", "earthlink.net", "juno.com", "btinternet.com", "virginmedia.com", "blueyonder.co.uk", "freeserve.co.uk", "live.co.uk", "ntlworld.com", "o2.co.uk", "orange.net", "sky.com", "talktalk.co.uk", "tiscali.co.uk", "virgin.net", "wanadoo.co.uk", "bt.com", "sina.com", "qq.com", "naver.com", "hanmail.net", "daum.net", "nate.com", "yahoo.co.jp", "yahoo.co.kr", "yahoo.co.id", "yahoo.co.in", "yahoo.com.sg", "yahoo.com.ph", "hotmail.fr", "live.fr", "laposte.net", "yahoo.fr", "wanadoo.fr", "orange.fr", "gmx.fr", "sfr.fr", "neuf.fr", "free.fr", "gmx.de", "hotmail.de", "live.de", "online.de", "t-online.de", "web.de", "yahoo.de", "mail.ru", "rambler.ru", "yandex.ru", "ya.ru", "list.ru", "hotmail.be", "live.be", "skynet.be", "voo.be", "tvcablenet.be", "telenet.be", "hotmail.com.ar", "live.com.ar", "yahoo.com.ar", "fibertel.com.ar", "speedy.com.ar", "arnet.com.ar", "yahoo.com.mx", "live.com.mx", "hotmail.es", "hotmail.com.mx", "prodigy.net.mx", "yahoo.com.br", "hotmail.com.br", "outlook.com.br", "uol.com.br", "bol.com.br", "terra.com.br", "ig.com.br", "itelefonica.com.br", "r7.com", "zipmail.com.br", "globo.com", "globomail.com", "oi.com.br"]; domain = email.replace(/.*@/, ""); domain = domain.toLowerCase(); if (emaillist.indexOf(domain) >= 0) { $("#sm").css({"color": "#bf0a0abd", "font-family":" 'Helvetica Neue',Helvetica,Arial,sans-serif"}).text("Please enter only Business email address."); $('#email').css({"border-color" : "#ef5d7a"}).focus(); return false; } $('#email').css({"border-color" : "green"}).focus(); $('#load').show(); $("#sm").css({"color": "green", "font-family":"'Helvetica Neue',Helvetica,Arial,sans-serif","background-color": "#d6f5d6", "border": "1px dotted green"}).text("Submitting Your Details..."); $.ajax({ type:"post", dataType: "text", url:'/newsletter_subscribe.php', data:{'email' : email,'source_site' : source_site, 'source_form' : source_form,'landing_page' : landing_page}, success: function (response) { if(response.trim()=="exists") { $.cookie('test', 'exist', { expires: 1460 ,path: '/', domain: '.thecybersecurityreview.com' }); $("#active-popup").hide(); $("#popup-container").hide(); $.ajax({ type:"post", dataType: "text", url:'/nl_cookie_for_all.php',data:{'email_cookie' : email},success: function (response_cook) {$('#picoutput').html(response_cook);} }) } else { $.cookie('test', 'exist', { expires: 1460 ,path: '/', domain: '.thecybersecurityreview.com' }); $("#active-popup").hide(); $("#popup-container").hide(); $('#thanksmsg').show().delay(10000).fadeOut();$('#newsltr').hide();$('#popup_nl').hide();$('#rightsideform').hide(); $.ajax({ type:"post", dataType: "text", url:'/nl_cookie_for_all.php',data:{'email_cookie' : email},success: function (response_cook) {$('#picoutput').html(response_cook);} }) } } }) }</script> <div class="container-fluid"><div class="container animate-box"><div class="row"><div class="owl-carousel owl-theme js carausel_slider section_margin" id="slider-small"> <div class="item px-2"><div class="alith_latest_trading_img_position_relative"><figure class="alith_post_thumb"><a href="https://managed-security.thecybersecurityreview.com/cxoinsight/information-security-awareness-programs-security-controls-for-the-most-vulnerable-attack-vector-nwid-473.html"><img style="width:100%;" src="https://www.thecybersecurityreview.com/newstransfer/upload/y6unl750513.jpg" alt="Information Security Awareness Programs Security Controls for the Most Vulnerable Attack Vector" title="Information Security Awareness Programs Security Controls for the Most Vulnerable Attack Vector"/></a></figure><div class="alith_post_title_small"><div style="margin-bottom:5px;font-size: 11px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Managed Security</div><a href="https://managed-security.thecybersecurityreview.com/cxoinsight/information-security-awareness-programs-security-controls-for-the-most-vulnerable-attack-vector-nwid-473.html"><strong class="truncate2l">Information Security Awareness Programs Security Controls for the Most Vulnerable Attack Vector</strong></a><p class="meta truncate2l" style="text-transform:none;" title="Alex Cummings, Information Security Awareness Program Manager, SouthState Bank"><span>Alex Cummings, Information Security Awareness Program Manager, SouthState Bank</span> </p></div></div></div> <div class="item px-2"><div class="alith_latest_trading_img_position_relative"><figure class="alith_post_thumb"><a href="https://virtual-ciso.thecybersecurityreview.com/cxoinsight/knowing-is-half-the-battle-nwid-1073.html"><img style="width:100%;" src="https://www.thecybersecurityreview.com/newstransfer/upload/ckv9h3m750.jpg" alt="Knowing Is Half The Battle" title="Knowing Is Half The Battle"/></a></figure><div class="alith_post_title_small"><div style="margin-bottom:5px;font-size: 11px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Virtual CISO</div><a href="https://virtual-ciso.thecybersecurityreview.com/cxoinsight/knowing-is-half-the-battle-nwid-1073.html"><strong class="truncate2l">Knowing Is Half The Battle</strong></a><p class="meta truncate2l" style="text-transform:none;" title="Ronald Buglione, Director, Cybersecurity - Cyber Intelligence & Incident Response, Cox Automotive"><span>Ronald Buglione, Director, Cybersecurity - Cyber Intelligence & Incident Response, Cox Automotive</span> </p></div></div></div> <div class="item px-2"><div class="alith_latest_trading_img_position_relative"><figure class="alith_post_thumb"><a href="https://cyber-security-canada.thecybersecurityreview.com/cxoinsight/state-of-the-art-and-trends-in-cybersecurity-nwid-948.html"><img style="width:100%;" src="https://www.thecybersecurityreview.com/newstransfer/upload/gaf22Untitled-44.jpg" alt="State Of the Art and Trends in Cybersecurity" title="State Of the Art and Trends in Cybersecurity"/></a></figure><div class="alith_post_title_small"><div style="margin-bottom:5px;font-size: 11px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Cyber Security </div><a href="https://cyber-security-canada.thecybersecurityreview.com/cxoinsight/state-of-the-art-and-trends-in-cybersecurity-nwid-948.html"><strong class="truncate2l">State Of the Art and Trends in Cybersecurity</strong></a><p class="meta truncate2l" style="text-transform:none;" title="Daniel A. Manrique, Head of Information Security, Mercantil Andina"><span>Daniel A. Manrique, Head of Information Security, Mercantil Andina</span> </p></div></div></div> <div class="item px-2"><div class="alith_latest_trading_img_position_relative"><figure class="alith_post_thumb"><a href="https://virtual-ciso.thecybersecurityreview.com/cxoinsight/enhancing-cyber-risk-management-integrating-mitre-attck-fair-and-the-nist-framework-nwid-1077.html"><img style="width:100%;" src="https://www.thecybersecurityreview.com/newstransfer/upload/psc9i6m750.jpg" alt="Enhancing Cyber Risk Management: Integrating Mitre Att&Ck, Fair, And The Nist Framework" title="Enhancing Cyber Risk Management: Integrating Mitre Att&Ck, Fair, And The Nist Framework"/></a></figure><div class="alith_post_title_small"><div style="margin-bottom:5px;font-size: 11px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Virtual CISO</div><a href="https://virtual-ciso.thecybersecurityreview.com/cxoinsight/enhancing-cyber-risk-management-integrating-mitre-attck-fair-and-the-nist-framework-nwid-1077.html"><strong class="truncate2l">Enhancing Cyber Risk Management: Integrating Mitre Att&Ck, Fair, And The Nist Framework</strong></a><p class="meta truncate2l" style="text-transform:none;" title="Albert Evans, Director, Chief of Information Security, ISO New England Inc."><span>Albert Evans, Director, Chief of Information Security, ISO New England Inc.</span> </p></div></div></div> <div class="item px-2"><div class="alith_latest_trading_img_position_relative"><figure class="alith_post_thumb"><a href="https://security-awareness-training.thecybersecurityreview.com/cxoinsight/strengthening-organizations-network-security--nwid-509.html"><img style="width:100%;" src="https://www.thecybersecurityreview.com/newstransfer/upload/w9s48750513.jpg" alt="Strengthening Organizations Network Security " title="Strengthening Organizations Network Security "/></a></figure><div class="alith_post_title_small"><div style="margin-bottom:5px;font-size: 11px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Security Awareness Training</div><a href="https://security-awareness-training.thecybersecurityreview.com/cxoinsight/strengthening-organizations-network-security--nwid-509.html"><strong class="truncate2l">Strengthening Organizations Network Security </strong></a><p class="meta truncate2l" style="text-transform:none;" title="Brenden Smith, CISO, FirstBank"><span>Brenden Smith, CISO, FirstBank</span> </p></div></div></div> <div class="item px-2"><div class="alith_latest_trading_img_position_relative"><figure class="alith_post_thumb"><a href="https://virtual-ciso.thecybersecurityreview.com/cxoinsight/implementing-cyber-security-strategies-in-retail-for-datadriven-success-nwid-1072.html"><img style="width:100%;" src="https://www.thecybersecurityreview.com/newstransfer/upload/2rfan2m750.jpg" alt="Implementing Cyber Security Strategies In Retail For Datadriven Success" title="Implementing Cyber Security Strategies In Retail For Datadriven Success"/></a></figure><div class="alith_post_title_small"><div style="margin-bottom:5px;font-size: 11px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Virtual CISO</div><a href="https://virtual-ciso.thecybersecurityreview.com/cxoinsight/implementing-cyber-security-strategies-in-retail-for-datadriven-success-nwid-1072.html"><strong class="truncate2l">Implementing Cyber Security Strategies In Retail For Datadriven Success</strong></a><p class="meta truncate2l" style="text-transform:none;" title="Arthur Phidd, Chief Information Officer, REEDS Jewelers"><span>Arthur Phidd, Chief Information Officer, REEDS Jewelers</span> </p></div></div></div> </div></div></div></div> <div class="container-fluid"> <div class="container"> <div class="row"> <div class="main" id="thanksmsg" style="display:none;margin-top: 15px;"> <div class="border"> <div class="inner-cutout"> <p class="knockout" style="margin-top: 0px;margin-bottom: 1px;font-size: 14px;line-height: 1.2;padding: 5px;padding-left: 20px;padding-right: 20px;font-weight: normal;"> Thank you for Subscribing to The Cyber Security Review Weekly Brief</p> </div> </div> </div> </div> <div class="primary margin-15"> <div class="row"> <div class="col-lg-12 col-md-12" > <!-- left sec start --> <style type="text/css">.demo5 ul li { padding: 10px 10px 10px 10px; border-bottom: 1px solid #ddd; border-radius: 10px;}.demo5.demof { } @media only screen and (max-width:991px){ .col-md-9.cxoslide { padding-left: 15px !important; margin-top: 0px !important;}} @media screen and (max-width: 768px) {.first-home-main {font-size: 20px !important;margin-bottom: 10px !important;margin-top: 10px !important;}.first-home-main-sub{font-size: 14px!important;} } @media screen and (min-width: 769px) {.first-home-main {margin-bottom: 10px !important;margin-top: 10px !important;font-size: 25px !important;}} @media screen and (max-width: 768px) {.truncate2l{ font-weight: 600 !important; margin-bottom: 12px; overflow: hidden; -o-text-overflow: ellipsis; text-overflow: ellipsis; display: -webkit-box !important; -webkit-line-clamp: 2; -webkit-box-orient: vertical;}} </style> <div class="row" id="newflex"><div class="col-md-6"><div class="owl-carousel owl-theme js section_margin line_hoz animate-box" id="slideshow_face"> <div class="item"><figure class="alith_post_thumb_big"><a href="https://www.thecybersecurityreview.com/network-systems-solutions"><img style="width:100%;" src="https://www.thecybersecurityreview.com/newstransfer/upload/41fws23.jpg" alt="Network Systems & Solutions: Fortifying Digital Information With Cutting-Edge Cybersecurity,Network Systems & Solutions" title="Network Systems & Solutions: Fortifying Digital Information With Cutting-Edge Cybersecurity,Network Systems & Solutions"/></a></figure><div style="margin-bottom:5px;font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Sonicwall</div><a href="https://www.thecybersecurityreview.com/network-systems-solutions"><h3 class="alith_post_title animate-box first-home-main truncate2l" data-animate-effect="fadeInUp">Network Systems & Solutions: Fortifying Digital Information With Cutting-Edge Cybersecurity,Network Systems & Solutions</h3></a><div class="alith_post_content_big"><div class="row"><div class="col-md-12 col-sm-12 animate-box"><p class="alith_post_except first-home-main-sub truncate2l">Joey Mazick, COO and Mike Mazick, Founder and Business Owner </p></div></div></div></div> <div class="item"><figure class="alith_post_thumb_big"><a href="https://www.thecybersecurityreview.com/digital-velocity"><img style="width:100%;" src="https://www.thecybersecurityreview.com/newstransfer/upload/fshfo9.jpg" alt="Digital Velocity: The Human Touch to Implementing Ironclad Cybersecurity,Digital Velocity" title="Digital Velocity: The Human Touch to Implementing Ironclad Cybersecurity,Digital Velocity"/></a></figure><div style="margin-bottom:5px;font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Virtual CISO</div><a href="https://www.thecybersecurityreview.com/digital-velocity"><h3 class="alith_post_title animate-box first-home-main truncate2l" data-animate-effect="fadeInUp">Digital Velocity: The Human Touch to Implementing Ironclad Cybersecurity,Digital Velocity</h3></a><div class="alith_post_content_big"><div class="row"><div class="col-md-12 col-sm-12 animate-box"><p class="alith_post_except first-home-main-sub truncate2l">Rick Rowley, CISO and Principal Architect </p></div></div></div></div> <div class="item"><figure class="alith_post_thumb_big"><a href="https://connected-security.thecybersecurityreview.com/cxoinsight/cybersecurity-and-the-itot-convergence-navigating-industry-40-nwid-976.html"><img style="width:100%;" src="https://www.thecybersecurityreview.com/newstransfer/upload/abi8s54.jpg" alt="Cybersecurity and the IT-OT Convergence: Navigating Industry 4.0" title="Cybersecurity and the IT-OT Convergence: Navigating Industry 4.0"/></a></figure><div style="margin-bottom:5px;font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Connected Security</div><a href="https://connected-security.thecybersecurityreview.com/cxoinsight/cybersecurity-and-the-itot-convergence-navigating-industry-40-nwid-976.html"><h3 class="alith_post_title animate-box first-home-main truncate2l" data-animate-effect="fadeInUp">Cybersecurity and the IT-OT Convergence: Navigating Industry 4.0</h3></a><div class="alith_post_content_big"><div class="row"><div class="col-md-12 col-sm-12 animate-box"><p class="alith_post_except first-home-main-sub truncate2l">Greg Sharma, Director – IT Infrastructure at Maple Lodge Farms </p></div></div></div></div></div> </div><!--<div class="col-md-4"><div class="post_list post_list_style_1"><article class="row section_margin animate-box"></article></div>--><div class="col-md-6 " > <div class="demo5 demof" style="position: relative; height: 445px; overflow: hidden;top: -10px;"> <ul style="margin: 0px; position: absolute; top: 0px;"> <li style="margin: 0px; display: list-item;"> <div class="row"> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-5"><a href="https://fortinet.thecybersecurityreview.com/cxoinsight/remember-the-impact-of-security-awareness-training-nwid-537.html" > <img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_EVP3.jpg" alt=""></a> </div> <div class="col-lg-9 col-md-9 col-sm-9 col-xs-7 cxoslide" style="padding-left: 0;"> <a href="https://fortinet.thecybersecurityreview.com/cxoinsight/remember-the-impact-of-security-awareness-training-nwid-537.html" style="font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Invitation Homes [NYSE: INVH] </a> <p style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;"><a href="https://fortinet.thecybersecurityreview.com/cxoinsight/remember-the-impact-of-security-awareness-training-nwid-537.html" style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;" class="truncate2l">Remember the IMPACT of Security Awareness Training</a> </p> <p style="color: #000;border-bottom: none;font-family: Arial,Helvetica,sans-serif;;line-height: 20px !important;padding-top:0px;font-size:13px; margin-bottom:0px" class="truncate2l">Robert Pace, VP/CISO, Invitation Homes </p> </div> </div> </li> <li style="margin: 0px; display: list-item;"> <div class="row"> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-5"><a href="https://penetration-testing.thecybersecurityreview.com/cxoinsight/advancing-cybersecurity-to-a-new-level-nwid-903.html" > <img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_xCt2.jpg" alt=""></a> </div> <div class="col-lg-9 col-md-9 col-sm-9 col-xs-7 cxoslide" style="padding-left: 0;"> <a href="https://penetration-testing.thecybersecurityreview.com/cxoinsight/advancing-cybersecurity-to-a-new-level-nwid-903.html" style="font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Dominion Energy [NYSE: D] </a> <p style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;"><a href="https://penetration-testing.thecybersecurityreview.com/cxoinsight/advancing-cybersecurity-to-a-new-level-nwid-903.html" style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;" class="truncate2l">Advancing Cyber-security to a New Level</a> </p> <p style="color: #000;border-bottom: none;font-family: Arial,Helvetica,sans-serif;;line-height: 20px !important;padding-top:0px;font-size:13px; margin-bottom:0px" class="truncate2l">Adam Lee, Vice President, CSO at Dominion Energy </p> </div> </div> </li> <li style="margin: 0px; display: list-item;"> <div class="row"> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-5"><a href="https://incident-response.thecybersecurityreview.com/cxoinsight/payments-fraud--nwid-913.html" > <img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_eO38.jpg" alt=""></a> </div> <div class="col-lg-9 col-md-9 col-sm-9 col-xs-7 cxoslide" style="padding-left: 0;"> <a href="https://incident-response.thecybersecurityreview.com/cxoinsight/payments-fraud--nwid-913.html" style="font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Zions Bancorporation </a> <p style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;"><a href="https://incident-response.thecybersecurityreview.com/cxoinsight/payments-fraud--nwid-913.html" style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;" class="truncate2l">Payments Fraud </a> </p> <p style="color: #000;border-bottom: none;font-family: Arial,Helvetica,sans-serif;;line-height: 20px !important;padding-top:0px;font-size:13px; margin-bottom:0px" class="truncate2l">Katherine Cobb, Cyber Incident Response Manager</p> </div> </div> </li> <li style="margin: 0px; display: list-item;"> <div class="row"> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-5"><a href="https://connected-security.thecybersecurityreview.com/cxoinsight/how-technology-is-revolutionizing-compliance-responsibilities-nwid-1004.html" > <img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_8fZs.jpg" alt=""></a> </div> <div class="col-lg-9 col-md-9 col-sm-9 col-xs-7 cxoslide" style="padding-left: 0;"> <a href="https://connected-security.thecybersecurityreview.com/cxoinsight/how-technology-is-revolutionizing-compliance-responsibilities-nwid-1004.html" style="font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Lowe’s Companies, Inc. </a> <p style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;"><a href="https://connected-security.thecybersecurityreview.com/cxoinsight/how-technology-is-revolutionizing-compliance-responsibilities-nwid-1004.html" style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;" class="truncate2l">How Technology is Revolutionizing Compliance Responsibilities</a> </p> <p style="color: #000;border-bottom: none;font-family: Arial,Helvetica,sans-serif;;line-height: 20px !important;padding-top:0px;font-size:13px; margin-bottom:0px" class="truncate2l">Margarita Rivera, C-CISO, CISSP, CISM, CRISC, CIPT, CISA Senior Director, Information Security [NYSE: LOW]</p> </div> </div> </li> <li style="margin: 0px; display: list-item;"> <div class="row"> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-5"><a href="https://penetration-testing.thecybersecurityreview.com/cxoinsight/security-architecture-boring-but-essential-nwid-1011.html" > <img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_nVAd.jpg" alt=""></a> </div> <div class="col-lg-9 col-md-9 col-sm-9 col-xs-7 cxoslide" style="padding-left: 0;"> <a href="https://penetration-testing.thecybersecurityreview.com/cxoinsight/security-architecture-boring-but-essential-nwid-1011.html" style="font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Southern Company [NYSE: HGTY] </a> <p style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;"><a href="https://penetration-testing.thecybersecurityreview.com/cxoinsight/security-architecture-boring-but-essential-nwid-1011.html" style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;" class="truncate2l">Security Architecture Boring But Essential</a> </p> <p style="color: #000;border-bottom: none;font-family: Arial,Helvetica,sans-serif;;line-height: 20px !important;padding-top:0px;font-size:13px; margin-bottom:0px" class="truncate2l">Mick Brons, Manager of Cyber Security Assurance, Southern Company </p> </div> </div> </li> <li style="margin: 0px; display: list-item;"> <div class="row"> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-5"><a href="https://security-ai.thecybersecurityreview.com/cxoinsight/digital-frontiers-how-cyberspace-is-shaping-the-future-of-space-operations--nwid-1131.html" > <img src="https://www.thecybersecurityreview.com/newstransfer/upload/Untitled-33-450x308_pLS6.jpg" alt=""></a> </div> <div class="col-lg-9 col-md-9 col-sm-9 col-xs-7 cxoslide" style="padding-left: 0;"> <a href="https://security-ai.thecybersecurityreview.com/cxoinsight/digital-frontiers-how-cyberspace-is-shaping-the-future-of-space-operations--nwid-1131.html" style="font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Lockheed Martin [NYSE: LMT] </a> <p style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;"><a href="https://security-ai.thecybersecurityreview.com/cxoinsight/digital-frontiers-how-cyberspace-is-shaping-the-future-of-space-operations--nwid-1131.html" style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;" class="truncate2l">Digital Frontiers: How Cyberspace is Shaping the Future of Space Operations </a> </p> <p style="color: #000;border-bottom: none;font-family: Arial,Helvetica,sans-serif;;line-height: 20px !important;padding-top:0px;font-size:13px; margin-bottom:0px" class="truncate2l">Maria Demaree, Vice President and General Manager - National Security Space, Lockheed Martin </p> </div> </div> </li> <li style="margin: 0px; display: list-item;"> <div class="row"> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-5"><a href="https://connected-security.thecybersecurityreview.com/cxoinsight/balancing-cybersecurity-strategy-with-business-objectives-nwid-1174.html" > <img src="https://www.thecybersecurityreview.com/newstransfer/upload/Untitled-32-450x308_r4I0.jpg" alt=""></a> </div> <div class="col-lg-9 col-md-9 col-sm-9 col-xs-7 cxoslide" style="padding-left: 0;"> <a href="https://connected-security.thecybersecurityreview.com/cxoinsight/balancing-cybersecurity-strategy-with-business-objectives-nwid-1174.html" style="font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Hagerty [NYSE: HGTY] </a> <p style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;"><a href="https://connected-security.thecybersecurityreview.com/cxoinsight/balancing-cybersecurity-strategy-with-business-objectives-nwid-1174.html" style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;" class="truncate2l">Balancing Cybersecurity Strategy with Business Objectives</a> </p> <p style="color: #000;border-bottom: none;font-family: Arial,Helvetica,sans-serif;;line-height: 20px !important;padding-top:0px;font-size:13px; margin-bottom:0px" class="truncate2l">Greg Bee, CISO, Hagerty </p> </div> </div> </li> <li style="margin: 0px; display: list-item;"> <div class="row"> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-5"><a href="https://connected-security.thecybersecurityreview.com/cxoinsight/threat-proofing-digital-assets-through-edr-nwid-1175.html" > <img src="https://www.thecybersecurityreview.com/newstransfer/upload/Untitled-34-450x308_o6pq.jpg" alt=""></a> </div> <div class="col-lg-9 col-md-9 col-sm-9 col-xs-7 cxoslide" style="padding-left: 0;"> <a href="https://connected-security.thecybersecurityreview.com/cxoinsight/threat-proofing-digital-assets-through-edr-nwid-1175.html" style="font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Oportun [NASDAQ: OPRT] </a> <p style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;"><a href="https://connected-security.thecybersecurityreview.com/cxoinsight/threat-proofing-digital-assets-through-edr-nwid-1175.html" style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;" class="truncate2l">Threat - Proofing Digital Assets through EDR</a> </p> <p style="color: #000;border-bottom: none;font-family: Arial,Helvetica,sans-serif;;line-height: 20px !important;padding-top:0px;font-size:13px; margin-bottom:0px" class="truncate2l">Xiaoying Hu, Senior Cybersecurity Manager at Oportun </p> </div> </div> </li> <li style="margin: 0px; display: list-item;"> <div class="row"> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-5"><a href="https://connected-security.thecybersecurityreview.com/cxoinsight/increasing-cyberthreats-in-the-time-of-ai-nwid-1177.html" > <img src="https://www.thecybersecurityreview.com/newstransfer/upload/Untitled-53-450x308_H7qB.jpg" alt=""></a> </div> <div class="col-lg-9 col-md-9 col-sm-9 col-xs-7 cxoslide" style="padding-left: 0;"> <a href="https://connected-security.thecybersecurityreview.com/cxoinsight/increasing-cyberthreats-in-the-time-of-ai-nwid-1177.html" style="font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Siemens Energy [ETR: ENR] </a> <p style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;"><a href="https://connected-security.thecybersecurityreview.com/cxoinsight/increasing-cyberthreats-in-the-time-of-ai-nwid-1177.html" style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;" class="truncate2l">Increasing Cyberthreats in the Time of AI</a> </p> <p style="color: #000;border-bottom: none;font-family: Arial,Helvetica,sans-serif;;line-height: 20px !important;padding-top:0px;font-size:13px; margin-bottom:0px" class="truncate2l">Leo Simonovich, Vice President and Global Head of Industrial Cyber and Digital Security at Siemens Energy </p> </div> </div> </li> <li style="margin: 0px; display: list-item;"> <div class="row"> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-5"><a href="https://cyber-security-europe.thecybersecurityreview.com/cxoinsight/aligning-peopleprocesstechnology-to-itcyber-job-roles-nwid-792.html" > <img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_I7Zi.jpg" alt=""></a> </div> <div class="col-lg-9 col-md-9 col-sm-9 col-xs-7 cxoslide" style="padding-left: 0;"> <a href="https://cyber-security-europe.thecybersecurityreview.com/cxoinsight/aligning-peopleprocesstechnology-to-itcyber-job-roles-nwid-792.html" style="font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">AT&T </a> <p style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;"><a href="https://cyber-security-europe.thecybersecurityreview.com/cxoinsight/aligning-peopleprocesstechnology-to-itcyber-job-roles-nwid-792.html" style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;" class="truncate2l">Aligning People-Process-Technology to IT/Cyber Job Roles</a> </p> <p style="color: #000;border-bottom: none;font-family: Arial,Helvetica,sans-serif;;line-height: 20px !important;padding-top:0px;font-size:13px; margin-bottom:0px" class="truncate2l">Joshua D. Copeland, Cybersecurity Director [NYSE: T]</p> </div> </div> </li> <li style="margin: 0px; display: list-item;"> <div class="row"> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-5"><a href="https://cyber-security-europe.thecybersecurityreview.com/cxoinsight/continual-improvement-in-the-key-to-optimum-cybersecurity-nwid-837.html" > <img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_z3V7.jpg" alt=""></a> </div> <div class="col-lg-9 col-md-9 col-sm-9 col-xs-7 cxoslide" style="padding-left: 0;"> <a href="https://cyber-security-europe.thecybersecurityreview.com/cxoinsight/continual-improvement-in-the-key-to-optimum-cybersecurity-nwid-837.html" style="font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Ally </a> <p style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;"><a href="https://cyber-security-europe.thecybersecurityreview.com/cxoinsight/continual-improvement-in-the-key-to-optimum-cybersecurity-nwid-837.html" style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;" class="truncate2l">Continual Improvement IN the Key to Optimum Cybersecurity</a> </p> <p style="color: #000;border-bottom: none;font-family: Arial,Helvetica,sans-serif;;line-height: 20px !important;padding-top:0px;font-size:13px; margin-bottom:0px" class="truncate2l">Eric Lovell, Senior Director, IT/Cyber Security Risk [NYSE: ALLY]</p> </div> </div> </li> <li style="margin: 0px; display: list-item;"> <div class="row"> <div class="col-lg-3 col-md-3 col-sm-3 col-xs-5"><a href="https://security-consulting-apac.thecybersecurityreview.com/cxoinsight/cybersecurity-strategy-for-global-consumer-products-company-in-china-market-nwid-905.html" > <img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_9730.jpg" alt=""></a> </div> <div class="col-lg-9 col-md-9 col-sm-9 col-xs-7 cxoslide" style="padding-left: 0;"> <a href="https://security-consulting-apac.thecybersecurityreview.com/cxoinsight/cybersecurity-strategy-for-global-consumer-products-company-in-china-market-nwid-905.html" style="font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">LOréal </a> <p style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;"><a href="https://security-consulting-apac.thecybersecurityreview.com/cxoinsight/cybersecurity-strategy-for-global-consumer-products-company-in-china-market-nwid-905.html" style="font: 600 15px Arial,Helvetica,sans-serif;color: #0f0f0f;border-bottom: none;padding-top:0px; margin-bottom:0px;" class="truncate2l">Cybersecurity Strategy for Global Consumer Products Company in China Market</a> </p> <p style="color: #000;border-bottom: none;font-family: Arial,Helvetica,sans-serif;;line-height: 20px !important;padding-top:0px;font-size:13px; margin-bottom:0px" class="truncate2l">James He, Cybersecurity Director</p> </div> </div> </li> </ul> </div> </div></div></div> <style>.category{}.hot-news .news-post .content .date { line-height: 17px !important;}.banner-text{padding-top: 0px;} </style><script type="application/ld+json">{"@context":"https://schema.org","@type":"Organization","name":"The Cyber Security Review", "url": "https://www.thecybersecurityreview.com/","logo": "https://www.thecybersecurityreview.com/images/logo.jpg","address": {"@type":"PostalAddress", "addressCountry":"United States","addressRegion":"FL","postalCode":"33301"},"email":"sales@thecybersecurityreview.com","sameAs":[ "https://twitter.com/thecybersecurityreview", "https://www.linkedin.com/company/thecybersecurityreview/", "https://www.thecybersecurityreview.com/about-us/", "https://www.thecybersecurityreview.com/subscribe/", "https://www.thecybersecurityreview.com/magazine/"] } </script> <style>@media only screen and (max-width:991px){.col-md-12.right-part { display: inline-block !important;}}@media screen and (max-width: 767px) {.by_line { font-size: 12px !important; }.title_new a { font-size: 16px !important; margin-bottom: 5px !important; }.sec3_col {margin-bottom: 20px !important;}}.title_new { margin-bottom: 8px;margin-top: 10px;}@media screen and (max-width: 768px) {.truncate2l{ font-weight: 600; margin-bottom: 12px; overflow: hidden; -o-text-overflow: ellipsis; text-overflow: ellipsis; display: -webkit-box; -webkit-line-clamp: 2; -webkit-box-orient: vertical;}.right-part {padding-left: 15px !important;}}</style> <h1 style="display: none;">The Cyber Security Review</h1> <div class="col-md-12 right-part" style="display:flex;padding-left: 0px;"> <div class="col-lg-9 col-md-12 col-sm-12" style=""> <div class="post_list post_list_style_1"> <article class="row section_margin animate-box" style="margin-bottom: 8px;"><div class="col-md-3 animate-box"><figure class="alith_news_img"><a href="https://managed-security.thecybersecurityreview.com/cxoinsight/federal-cybersecurity-regulation-impacts-on-aec-community-nwid-603.html"><img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_N8mS.jpg" class="img-res" alt="Federal Cybersecurity Regulation Impacts On Aec Community" title="Federal Cybersecurity Regulation Impacts On Aec Community"/></a></figure></div><div class="col-md-9 animate-box"><h3 class="alith_post_title title_new"><div style="margin-bottom:5px;font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Managed Security</div><a class="truncate2l" href="https://managed-security.thecybersecurityreview.com/cxoinsight/federal-cybersecurity-regulation-impacts-on-aec-community-nwid-603.html">Federal Cybersecurity Regulation Impacts On Aec Community</a></h3><div class="post_meta by_line"><p class="truncate2l">David Brearley, Operational Technology Cybersecurity Director, HDR</p></div></div></article><article class="row section_margin animate-box" style="margin-bottom: 8px;"><div class="col-md-3 col-sm-5 col-xs-5 animate-box"><figure class="alith_news_img"><a href="https://virtual-ciso.thecybersecurityreview.com/cxoinsight/my-journey-in-it-and-cybersecurity-nwid-1075.html"><img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_oEU8.jpg" class="img-res" alt="My Journey In It And Cybersecurity" title="My Journey In It And Cybersecurity"/></a></figure></div><div class="col-md-9 col-sm-7 col-xs-7 animate-box"><h3 class="alith_post_title title_new"><div style="margin-bottom:5px;font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Virtual CISO</div><a class="truncate2l" href="https://virtual-ciso.thecybersecurityreview.com/cxoinsight/my-journey-in-it-and-cybersecurity-nwid-1075.html">My Journey In It And Cybersecurity</a></h3><div class="post_meta by_line"><p class="truncate2l">Ray Massari, Sr.Director, IT Security and Infrastructure, Jacuzzi Group</p></div></div></article><article class="row section_margin animate-box" style="margin-bottom: 8px;"><div class="col-md-3 col-sm-5 col-xs-5 animate-box"><figure class="alith_news_img"><a href="https://penetration-testing.thecybersecurityreview.com/cxoinsight/the-evolution-of-cybersecurity-awareness-training-testing-nwid-749.html"><img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_M1i3.jpg" class="img-res" alt="The Evolution of Cybersecurity Awareness, Training, &Testing" title="The Evolution of Cybersecurity Awareness, Training, &Testing"/></a></figure></div><div class="col-md-9 col-sm-7 col-xs-7 animate-box"><h3 class="alith_post_title title_new"><div style="margin-bottom:5px;font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Penetration Testing</div><a class="truncate2l" href="https://penetration-testing.thecybersecurityreview.com/cxoinsight/the-evolution-of-cybersecurity-awareness-training-testing-nwid-749.html">The Evolution of Cybersecurity Awareness, Training, &Testing</a></h3><div class="post_meta by_line"><p class="truncate2l">Mark Dunkerley, Director, IT Architecture and Cybersecurity at Coca-Cola Bottlers’ Sales & Services</p></div></div></article> </div><div class="post_list post_list_style_1"> <article class="row section_margin animate-box"><div class="col-md-6 col-sm-6 col-xs-6 animate-box"><div class="col-md-12 " style="padding-left: 0;padding-right: 0;"><figure class="alith_news_img"><a href="https://www.thecybersecurityreview.com/news/becloud-enterprisegrade-managed-it-and-cyber-security-services-nwid-169.html"><img src="https://www.thecybersecurityreview.com/newstransfer/upload/4udbfArtboard-2.jpg" class="img-res" alt="BeCloud: Enterprise-Grade Managed IT and Cyber Security Services" title="BeCloud: Enterprise-Grade Managed IT and Cyber Security Services"/></a></figure></div><div class="col-md-12 animate-box" style="padding-left: 0;padding-right: 0;"><h2 class="alith_post_title title_new"><div style="margin-bottom:5px;font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;"></div><a href="https://www.thecybersecurityreview.com/news/becloud-enterprisegrade-managed-it-and-cyber-security-services-nwid-169.html" class="truncate2l">BeCloud: Enterprise-Grade Managed IT and Cyber Security Services</a></h2><div class="post_meta by_line"><p class="truncate2l"> James Phipps, President</p></div></div></div><div class="col-md-6 col-sm-6 col-xs-6 animate-box"><div class="col-md-12 " style="padding-left: 0;padding-right: 0;"><figure class="alith_news_img"><a href="https://iam-europe.thecybersecurityreview.com/cxoinsight/the-risks-of-a-competitive-business-culture-to-information-security-nwid-677.html"><img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_56lv.webp" class="img-res" alt="The Risks of a Competitive Business Culture to Information Security" title="The Risks of a Competitive Business Culture to Information Security"/></a></figure></div><div class="col-md-12 animate-box" style="padding-left: 0;padding-right: 0;"><h2 class="alith_post_title title_new"><div style="margin-bottom:5px;font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">IAM </div><a href="https://iam-europe.thecybersecurityreview.com/cxoinsight/the-risks-of-a-competitive-business-culture-to-information-security-nwid-677.html" class="truncate2l">The Risks of a Competitive Business Culture to Information Security</a></h2><div class="post_meta by_line"><p class="truncate2l"> Ian Hill, Director of Cyber Security, BGL Insurance</p></div></div></div></article></div><div class="post_list post_list_style_1"><article class="row section_margin animate-box fadeInUp animated-fast"><div class="col-md-4 animate-box fadeInUp animated-fast sec3_col"><div class="col-md-12 " style="padding-left: 0;padding-right: 0;"><figure class="alith_news_img"><a href="https://incident-response.thecybersecurityreview.com/cxoinsight/incident-response-at-fiege-group-nwid-854.html"><img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_8cI9.jpg" class="img-res" alt="Incident Response at FIEGE Group" title="Incident Response at FIEGE Group"/></a></figure></div><div class="col-md-12 animate-box" style="padding-left: 0;padding-right: 0;"><h3 class="alith_post_title title_new"><div style="margin-bottom:5px;font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Incident Response</div><a href="https://incident-response.thecybersecurityreview.com/cxoinsight/incident-response-at-fiege-group-nwid-854.html" class="truncate2l">Incident Response at FIEGE Group</a></h3><div class="post_meta by_line"><p class="truncate2l"> Boris Awdejew, Head of Information Security, Global CISO at FIEGE.</p></div></div></div><div class="col-md-8 animate-box fadeInUp animated-fast"><article class="row section_margin animate-box fadeInUp animated-fast" style="margin-bottom: 0px;"><div class="col-md-3 col-sm-5 col-xs-5 animate-box fadeInUp animated-fast"><figure class="alith_news_img"><a href="https://virtual-ciso.thecybersecurityreview.com/cxoinsight/dear-cio-you-must-support-the-ciso-it-s-for-your-own-good-nwid-888.html"><img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_Ers4.jpg" class="img-res" alt="Dear CIO, You Must Support the CISO; it's for Your Own Good" title="Dear CIO, You Must Support the CISO; it's for Your Own Good"/></a></figure></div><div class="col-md-9 col-sm-7 col-xs-7 animate-box fadeInUp animated-fast"><h3 class="alith_post_title title_new"><div style="margin-bottom:5px;font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Virtual CISO</div><a href="https://virtual-ciso.thecybersecurityreview.com/cxoinsight/dear-cio-you-must-support-the-ciso-it-s-for-your-own-good-nwid-888.html" class="truncate2l">Dear CIO, You Must Support the CISO; it's for Your Own Good</a></h3><div class="post_meta by_line"><p class="truncate2l"> Christos Syngelakis, CISO/DPO, Motor Oil</p></div></div></article><article class="row section_margin animate-box fadeInUp animated-fast" style="margin-bottom: 0px;"><div class="col-md-3 col-sm-5 col-xs-5 animate-box fadeInUp animated-fast"><figure class="alith_news_img"><a href="https://security-ai.thecybersecurityreview.com/cxoinsight/how-ai-elevates-corporate-physical-security-nwid-1079.html"><img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_iL7M.jpg" class="img-res" alt="How AI Elevates Corporate Physical Security" title="How AI Elevates Corporate Physical Security"/></a></figure></div><div class="col-md-9 col-sm-7 col-xs-7 animate-box fadeInUp animated-fast"><h3 class="alith_post_title title_new"><div style="margin-bottom:5px;font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Security AI</div><a href="https://security-ai.thecybersecurityreview.com/cxoinsight/how-ai-elevates-corporate-physical-security-nwid-1079.html" class="truncate2l">How AI Elevates Corporate Physical Security</a></h3><div class="post_meta by_line"><p class="truncate2l"> William Davis, Sr. Director of Physical Security, Ally</p></div></div></article><article class="row section_margin animate-box fadeInUp animated-fast" style="margin-bottom: 0px;"><div class="col-md-3 col-sm-5 col-xs-5 animate-box fadeInUp animated-fast"><figure class="alith_news_img"><a href="https://penetration-testing.thecybersecurityreview.com/cxoinsight/significance-of-pen-testing-nwid-1007.html"><img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_hC38.jpg" class="img-res" alt="Significance of Pen Testing" title="Significance of Pen Testing"/></a></figure></div><div class="col-md-9 col-sm-7 col-xs-7 animate-box fadeInUp animated-fast"><h3 class="alith_post_title title_new"><div style="margin-bottom:5px;font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Penetration Testing</div><a href="https://penetration-testing.thecybersecurityreview.com/cxoinsight/significance-of-pen-testing-nwid-1007.html" class="truncate2l">Significance of Pen Testing</a></h3><div class="post_meta by_line"><p class="truncate2l"> Erika Carrara, Vice President, Chief Information Security Officer at Wabtec </p></div></div></article></div></article></div><div class="post_list post_list_style_1 0" > <article class="row section_margin animate-box" style="margin-bottom: 8px;"><div class="col-md-3 animate-box"><figure class="alith_news_img"><a href="https://virtual-ciso.thecybersecurityreview.com/cxoinsight/effective-communications-between-cisos-and-key-stakeholders-nwid-1071.html"><img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_oRI7.jpg" class="img-res" alt="Effective Communications between CISOs and Key Stakeholders" title="Effective Communications between CISOs and Key Stakeholders"/></a></figure></div><div class="col-md-9 animate-box"><h3 class="alith_post_title title_new"><div style="margin-bottom:5px;font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Virtual CISO</div><a class="truncate2l" href="https://virtual-ciso.thecybersecurityreview.com/cxoinsight/effective-communications-between-cisos-and-key-stakeholders-nwid-1071.html">Effective Communications between CISOs and Key Stakeholders</a></h3><div class="post_meta by_line"><p class="truncate2l">By Kevin P. Gowen, Chief Information Security Officer, Synovus</p></div></div></article><article class="row section_margin animate-box" style="margin-bottom: 8px;"><div class="col-md-3 col-sm-5 col-xs-5 animate-box"><figure class="alith_news_img"><a href="https://security-ai.thecybersecurityreview.com/cxoinsight/are-we-artificially-inflating-ai-in-cybersecurity-nwid-1061.html"><img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_e5F4.jpg" class="img-res" alt="Are We Artificially Inflating AI in Cybersecurity?" title="Are We Artificially Inflating AI in Cybersecurity?"/></a></figure></div><div class="col-md-9 col-sm-7 col-xs-7 animate-box"><h3 class="alith_post_title title_new"><div style="margin-bottom:5px;font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Security AI</div><a class="truncate2l" href="https://security-ai.thecybersecurityreview.com/cxoinsight/are-we-artificially-inflating-ai-in-cybersecurity-nwid-1061.html">Are We Artificially Inflating AI in Cybersecurity?</a></h3><div class="post_meta by_line"><p class="truncate2l">By Raymond Kent, ASTC, Assoc AIA Senior Design Leader, Principal DLR Group</p></div></div></article><article class="row section_margin animate-box" style="margin-bottom: 8px;"><div class="col-md-3 col-sm-5 col-xs-5 animate-box"><figure class="alith_news_img"><a href="https://virtual-ciso.thecybersecurityreview.com/cxoinsight/building-a-comprehensive-industrial-cyber-security-program-nwid-886.html"><img src="https://www.thecybersecurityreview.com/newstransfer/upload/450x308_xC31.jpg" class="img-res" alt="Building a Comprehensive Industrial Cyber Security Program" title="Building a Comprehensive Industrial Cyber Security Program"/></a></figure></div><div class="col-md-9 col-sm-7 col-xs-7 animate-box"><h3 class="alith_post_title title_new"><div style="margin-bottom:5px;font-size: 12px;text-transform: uppercase;color: black;font-family: Arial,Helvetica,sans-serif;">Virtual CISO</div><a class="truncate2l" href="https://virtual-ciso.thecybersecurityreview.com/cxoinsight/building-a-comprehensive-industrial-cyber-security-program-nwid-886.html">Building a Comprehensive Industrial Cyber Security Program</a></h3><div class="post_meta by_line"><p class="truncate2l">By Mohamad Mahjoub, CISO, Veolia Middle East</p></div></div></article> </div> </div> <style> .post_meta,.meta_date{text-transform: none !important;}#magz1 .owl-prev { float: left; background-color: #ddd; padding-left: 0; padding-right: 0; padding-bottom: 0;}#magz1 .owl-next { float: right; background-color: #ddd; padding-left: 0; padding-right: 0; padding-bottom: 0;}.arrow-prev, .arrow-next{top: 30px;}.post_meta span{margin: 0 0 0 0 !important;}@media screen and (min-width: 320px) and (max-width: 380px){#techhhd{font-size: 14px;}}@media screen and (min-width: 768px) and (max-width: 1199px){#techhhd{font-size: 12px;}#techhhd1{line-height: 13px;}}@media screen and (min-width: 360px) and (max-width: 991px){#magz1{width: 300px!important;}}.sidebarright { z-index: 1; top: 0px; left: 10px; overflow-x: hidden; padding: 8px 0; position:sticky !important;}fieldset { border: 1px solid #c0c0c0; margin: 0 2px; padding: 0.35em 0.625em 0.75em;}.text-danger { color: #a94442 !important;} .hvr-overline-from-left { display: inline-block; vertical-align: middle; -webkit-transform: perspective(0px) translateZ(0); transform: perspective(0px) translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); position: relative; overflow: hidden;}.hvr-overline-from-left:hover::before, .hvr-overline-from-left:focus::before, .hvr-overline-from-left:active::before { right: 0;}.hvr-overline-from-left::before { content: ""; position: absolute; z-index: -1; left: 0; right: 100%; top: 0; background: #2098D1; height: 4px; -webkit-transition-property: right; transition-property: right; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out;}.hvr-bubble-left { display: inline-block; vertical-align: middle; -webkit-transform: perspective(0px) translateZ(0); transform: perspective(0px) translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); position: relative;}[class^="hvr-"] { padding: 1em; cursor: pointer; background: #e1e1e1;text-decoration: none;color: #666; -webkit-tap-highlight-color: rgba(0,0,0,0); -webkit-font-smoothing: antialiased; -moz-osx-font-smoothing: grayscale;}.hvr-bubble-left:hover::before, .hvr-bubble-left:focus::before, .hvr-bubble-left:active::before {-webkit-transform: translateX(-10px);transform: translateX(-10px);}.hvr-bubble-left::before {pointer-events: none;position: absolute;z-index: -1;content: '';border-style: solid;-webkit-transition-duration: 0.3s;transition-duration: 0.3s;-webkit-transition-property: transform;transition-property: transform;top: calc(50% - 10px);left: 0;border-width: 10px 10px 10px 0;border-color: transparent #ee312f transparent transparent;}.project-b { background-color: #0463b0;margin-bottom: 0;color: #fff;padding-top: 5px;padding-bottom: 4px;text-align: center;font-size: 16px;font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif;font-weight: 500;width: 100%;float: left; border-bottom: 1px solid #ddd;letter-spacing: 1.2px;margin-top:0px;}.project-c{ background-color: #ee312f;margin-bottom: 0;color: #fff;padding-top: 5px;padding-bottom: 5px;text-align: center;font-size: 18px;font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif;font-weight: 500;width: 100%;float: right;padding-left: 2px;padding-right: 3px;line-height: 19px;margin-top:0px;position: relative;} .vc_container{ height: 450px !important; overflow-y: auto; background-color: #fff;}.verticalCarousel{margin-top: 0px !important;margin: 27px auto;}.verticalCarouselGroup.vc_list > li { margin: 10px; border-width: 0px; border-style: solid; padding: 0px; background-color: #fff; -moz-box-shadow: 1px 1px 2px rgba(0, 0, 0, 0.05); -webkit-box-shadow: 1px 1px 2px rgba(0, 0, 0, 0.05); box-shadow: 1px 1px 2px rgba(255, 255, 255, 0.05);} .rrgp{ line-height: 18px;font-weight: normal;color: #000;font-size: 14px;font-family: 'Helvetica Neue',Helvetica,Arial,sans-serif;padding-bottom: 0px;border-bottom: 1px solid #ddd;}</style> <div class="col-lg-3 col-md-12 right" style="position: sticky;top: 0px;"><!-- <div> <div class="verticalCarousel"> <div class="verticalCarouselHeader"> <h3 style="color: #fff;font-size: 18px;padding-left: 10px;">DON'T MISS</h3>--> <!--a href="#" class="vc_goDown"><i class="fa fa-fw fa-angle-down"></i></a> <a href="#" class="vc_goUp"><i class="fa fa-fw fa-angle-up"></i></a--> <!--</div> <div class="vc_container" style="height: 545px;"><ul class="verticalCarouselGroup vc_list" style="transform: translateY(0px);"> <li> <a href="https://www.thecybersecurityreview.com/news/the-role-of-the-dark-web-in-modern-cybersecurity-challenges-nwid-1216.html"> <h4 class="truncate2l rrgp">The Role of the Dark Web in Modern Cybersecurity Challenges</h4></a> <p style="color: #7c7c7c;">Friday,January 29, 2021</p> --><!-- </li> <li> <a href="https://www.thecybersecurityreview.com/news/understanding-ai-s-influence-on-cybersecurity--nwid-1215.html"> <h4 class="truncate2l rrgp">Understanding AI's Influence on Cybersecurity </h4></a> <p style="color: #7c7c7c;">Friday,January 29, 2021</p> --><!-- </li> <li> <a href="https://www.thecybersecurityreview.com/news/atumcell-releases-2025-cybersecurity-roadmap-for-midmarket-private-equity-firms-nwid-1214.html"> <h4 class="truncate2l rrgp">Atumcell Releases 2025 Cybersecurity Roadmap for Mid-Market Private Equity Firms</h4></a> <p style="color: #7c7c7c;">Friday,January 29, 2021</p> --><!-- </li> <li> <a href="https://www.thecybersecurityreview.com/news/the-impact-of-virtual-cisos-on-smb-cybersecurity-nwid-1213.html"> <h4 class="truncate2l rrgp">The Impact of Virtual CISOs on SMB Cybersecurity</h4></a> <p style="color: #7c7c7c;">Friday,January 29, 2021</p> --><!-- </li> <li> <a href="https://www.thecybersecurityreview.com/news/an-expert-guide-on-the-impact-of-cybersecurity-awareness-in-corporate-settings-nwid-1211.html"> <h4 class="truncate2l rrgp">An Expert Guide on the Impact of Cybersecurity Awareness in Corporate Settings</h4></a> <p style="color: #7c7c7c;">Friday,January 29, 2021</p> --><!-- </li> <li> <a href="https://www.thecybersecurityreview.com/news/german-police-dismantle-cracked-and-nulled-cybercrime-networks-nwid-1212.html"> <h4 class="truncate2l rrgp">German Police Dismantle Cracked and Nulled Cybercrime Networks</h4></a> <p style="color: #7c7c7c;">Friday,January 29, 2021</p> --><!-- </li> <li> <a href="https://www.thecybersecurityreview.com/news/the-role-of-ai-in-enhancing-cybersecurity-operations-nwid-1209.html"> <h4 class="truncate2l rrgp">The Role of AI in Enhancing Cybersecurity Operations</h4></a> <p style="color: #7c7c7c;">Friday,January 29, 2021</p> --><!-- </li> <li> <a href="https://www.thecybersecurityreview.com/news/best-practices-for-managing-cybersecurity-risks-effectively-nwid-1208.html"> <h4 class="truncate2l rrgp">Best Practices for Managing Cybersecurity Risks Effectively</h4></a> <p style="color: #7c7c7c;">Friday,January 29, 2021</p> --><!-- </li> <li> <a href="https://www.thecybersecurityreview.com/news/understanding-cybersecurity-threats-in-a-digital-landscape-nwid-1207.html"> <h4 class="truncate2l rrgp">Understanding Cybersecurity Threats in a Digital Landscape</h4></a> <p style="color: #7c7c7c;">Friday,January 29, 2021</p> --><!-- </li> <li> <a href="https://www.thecybersecurityreview.com/news/rising-multifaceted-extortion-threats-in-cybersecurity-nwid-1206.html"> <h4 class="truncate2l rrgp">Rising Multifaceted Extortion Threats in Cybersecurity</h4></a> <p style="color: #7c7c7c;">Friday,January 29, 2021</p> --><!-- </li> </ul></div> </div> </div> --><!--ul class="verticalCarouselGroup vc_list" style="transform: translateY(-381px);"> <li> <a href="https://www.thecybersecurityreview.com/news/the-role-of-the-dark-web-in-modern-cybersecurity-challenges-nwid-1216.html" style="font-weight: bold;color:#000;font-size: 18px;"><h4 style="line-height: 26px;font-size: 18px;"> The Role of the Dark Web in Modern Cybersecurity Challenges</h4></a> <p>Wednesday,February 12,2025</p> </li> <li> <a href="https://www.thecybersecurityreview.com/news/understanding-ai-s-influence-on-cybersecurity--nwid-1215.html" style="font-weight: bold;color:#000;font-size: 18px;"><h4 style="line-height: 26px;font-size: 18px;"> Understanding AI's Influence on Cybersecurity </h4></a> <p>Tuesday,February 11,2025</p> </li> <li> <a href="https://www.thecybersecurityreview.com/news/atumcell-releases-2025-cybersecurity-roadmap-for-midmarket-private-equity-firms-nwid-1214.html" style="font-weight: bold;color:#000;font-size: 18px;"><h4 style="line-height: 26px;font-size: 18px;"> Atumcell Releases 2025 Cybersecurity Roadmap for Mid-Market...</h4></a> <p>Monday,February 10,2025</p> </li> <li> <a href="https://www.thecybersecurityreview.com/news/the-impact-of-virtual-cisos-on-smb-cybersecurity-nwid-1213.html" style="font-weight: bold;color:#000;font-size: 18px;"><h4 style="line-height: 26px;font-size: 18px;"> The Impact of Virtual CISOs on SMB Cybersecurity</h4></a> <p>Monday,February 10,2025</p> </li> <li> <a href="https://www.thecybersecurityreview.com/news/an-expert-guide-on-the-impact-of-cybersecurity-awareness-in-corporate-settings-nwid-1211.html" style="font-weight: bold;color:#000;font-size: 18px;"><h4 style="line-height: 26px;font-size: 18px;"> An Expert Guide on the Impact of Cybersecurity Awareness in...</h4></a> <p>Monday,February 10,2025</p> </li> <li> <a href="https://www.thecybersecurityreview.com/news/german-police-dismantle-cracked-and-nulled-cybercrime-networks-nwid-1212.html" style="font-weight: bold;color:#000;font-size: 18px;"><h4 style="line-height: 26px;font-size: 18px;"> German Police Dismantle Cracked and Nulled Cybercrime Networks</h4></a> <p>Monday,February 10,2025</p> </li> <li> <a href="https://www.thecybersecurityreview.com/news/the-role-of-ai-in-enhancing-cybersecurity-operations-nwid-1209.html" style="font-weight: bold;color:#000;font-size: 18px;"><h4 style="line-height: 26px;font-size: 18px;"> The Role of AI in Enhancing Cybersecurity Operations</h4></a> <p>Thursday,February 06,2025</p> </li> <li> <a href="https://www.thecybersecurityreview.com/news/best-practices-for-managing-cybersecurity-risks-effectively-nwid-1208.html" style="font-weight: bold;color:#000;font-size: 18px;"><h4 style="line-height: 26px;font-size: 18px;"> Best Practices for Managing Cybersecurity Risks Effectively</h4></a> <p>Wednesday,February 05,2025</p> </li> <li> <a href="https://www.thecybersecurityreview.com/news/understanding-cybersecurity-threats-in-a-digital-landscape-nwid-1207.html" style="font-weight: bold;color:#000;font-size: 18px;"><h4 style="line-height: 26px;font-size: 18px;"> Understanding Cybersecurity Threats in a Digital Landscape</h4></a> <p>Monday,February 03,2025</p> </li> <li> <a href="https://www.thecybersecurityreview.com/news/rising-multifaceted-extortion-threats-in-cybersecurity-nwid-1206.html" style="font-weight: bold;color:#000;font-size: 18px;"><h4 style="line-height: 26px;font-size: 18px;"> Rising Multifaceted Extortion Threats in Cybersecurity</h4></a> <p>Monday,February 03,2025</p> </li> </ul> </div>--> <script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.3/jquery.min.js"></script> <script type="text/javascript" src="https://www.thecybersecurityreview.com/jsweb/jQuery.verticalCarousel.js"></script> <script type="text/javascript"> $(".verticalCarousel").verticalCarousel({ currentItem: 1, showItems: 4, }); </script> <div class="col-md-12 sidebarright"> <div class="theiaStickySidebar" style="padding-top: 0px; padding-bottom: 1px; position: static;"> <div class="container-fluid" id="magz1" style="display:block;"><h5 class="line" style="font-weight: bolder;"><span style="line-height:23px;">ON THE DECK</span></h5><div class="container animate-box fadeIn animated-fast" data-animate-effect="fadeIn"><div class="row"><div class="owl-carousel owl-theme js section_margin owl-loaded owl-drag" id="slideshow_big"> <div class="item"> <figure class="alith_post_thumb_big" style="z-index: 999;float: left;"> <a href="https://www.thecybersecurityreview.com/magazines/February/2025/" target="_blank" ><img style="width:100%;" alt=" The Cyber Security Review" title=" The Cyber Security Review" src="https://www.thecybersecurityreview.com/uploaded_images/magazine_img/9l649Cyber-Security-Review-(Jan---March--2025)-Magzter-1.jpg" /></a> </figure> </div> <div class="item"> <a href="https://security-ai.thecybersecurityreview.com/vendors/top-security-ai-solutions-providers.html" > <p Class="hvr-overline-from-left project-b " style="padding-left: 5px;padding-right: 5px;" > Security AI </p> </a> <figure class="alith_post_thumb_big" style="z-index: 999;float: left;"> <a href="https://www.thecybersecurityreview.com/magazines/October2024/Security_AI/" target="_blank" ><img style="width:100%;" alt=" Security AI | The Cyber Security Review" title=" Security AI | The Cyber Security Review" src="https://www.thecybersecurityreview.com/uploaded_images/magazine_img/y8z11300350.jpg" /></a> </figure> </div></div></div></div></div> <center><div id="newsgoogad"> </div> </center> </div></div> </div> </div> </div> </div> </div> </div> <div></div> </div> <div class="container-fluid"> <div class="container animate-box"> <div class="bottom margin-15" style="border-bottom: 3px solid;"> </div> </div> </div> <style type="text/css">.fa{width: 23px;padding-left: 5px;}.share-link{border:1px solid black;border-radius: 50%;}</style> <div class="container-fluid alith_footer_right_reserved"><div class="container"><div class="row"><div class="col-md-1" style="padding-top: 5px;"><span style="margin-left: 15px;"> <a href="https://www.linkedin.com/company/the-cyber-security-review/" target="_blank" title="Linkedin" class="share-link"><i class="fa fa-linkedin"></i></a> </span> </div><div class="col-sm-11 col-md-11 coppyright"> Copyright &copy; 2025 <a href="https://www.thecybersecurityreview.com/">The Cyber Security Review.</a> All rights reserved<span style="font-weight:bold;">|&nbsp;&nbsp;</span><a href="https://www.thecybersecurityreview.com/subscribe/"><span style="">Subscribe </span></a> <span style="font-weight:bold;">|&nbsp;&nbsp;</span><a href="https://www.thecybersecurityreview.com/about-us/"><span style="">About Us </span></a><span style="font-weight:bold;">|&nbsp;&nbsp;</span><a href="https://www.thecybersecurityreview.com/newsletter/"><span style="">Newsletter </span></a> <span style="font-weight:bold;"> |&nbsp;&nbsp;</span><a href="https://www.thecybersecurityreview.com/sitemaps/"><span style="">Sitemap</span></a><span style="font-weight:bold;"> |&nbsp;&nbsp;</span><a href="https://www.thecybersecurityreview.com/editorial_policy/"><span style="">Editorial Policy</span></a><span style="font-weight:bold;"> |&nbsp;&nbsp;</span><a href="https://www.thecybersecurityreview.com/feedback-mechanism-and-correction-Policy/"><span style="">Feedback Policy</span></a> <span style="font-weight:bold;"> </div></div> </div></div> <div class="footer" id='footerr'> <div class="row"> <div class="col-xs-12 col-sm-12 col-md-10 col-lg-10"> <p style="color: #fff !important;margin-bottom:0;padding:0;border-bottom:none;"> We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. <span><a href="/privacy-policy/" style="text-decoration: none; color: rgb(241, 214, 0);">More info</a></span></p> </div> <div class="col-xs-12 col-sm-12 col-md-2 col-lg-2"> <p style="margin:0;border-bottom:none;"><span class="closee"><a onclick="set_cookie()" style='color: #000; font-weight: 600;'>I agree</a></span></p> </div> </div> </div> <div class="gototop js-top"> <a href="#" class="js-gotop"><span>Take Me Top</span></a> </div> </div> </div> <script> $(document).ready(function() { /* $("body").on("contextmenu",function(e){return false;}); */$(document).bind("contextmenu", function(e) { return $(e.target).hasClass('context'); }); }); function OnCopy() { $("#notification-restrict-message").show(); return false; } function hide_message() { $("#notification-restrict-message").hide(); } </script> <script type="text/javascript"> $(document).ready(function() { var screen = 'home'; if (screen == 'home') { $("#home_id").addClass("active"); } else if (screen == 'news_listing' || screen == 'news_desc') { $("#news_id").addClass("active"); } else if (screen == 'cxoinsightsnews_listing' || screen == 'cxo_insights_demo') { $("#cxo_id").addClass("active"); } else if (screen == 'cioviewpointsnews_listing' || screen == 'cio_viewpoints_demo') { $("#ciovw_id").addClass("active"); } else if (screen == 'conf_listing') { $("#conference_id").addClass("active"); } else if (screen == 'newsletter_front') { $("#newsletter_id").addClass("active"); } else if (screen == "contact") { $("#aboutus").addClass("active"); } else if (screen == 'subscribe') { $("#subscribe_id").addClass("active"); } }); </script> <script> function openNav() { document.getElementById("mySidenav").style.width = "250px"; } function closeNav() { document.getElementById("mySidenav").style.width = "0"; } </script> <!--<script src="https://www.thecybersecurityreview.com/jsweb/balanceright.js"></script>--> <div style="display: none;" id="notification-restrict-message"><div class="box-design-message" id="Update_Outer"></div><div class="box-inner-design" id="ctl00_centerCPH_WaitPnlsdf"><div id="nofication-box"><div style="width:100%;"><span style="float:left;width:80%;"><span class="title1">This content is copyright protected</span></span><span style="float:right;width:5%;"><a href="javascript:;" id="hide-notification-message" onclick="hide_message()"><img src='https://www.thecybersecurityreview.com/images/x.png' alt='' /> </a></span><div><div class="box_pad" style="width:100%;float:left;"><p class="message">However, if you would like to share the information in this article, you may use the link below:</p><p class="message content-link"><a href="https://www.thecybersecurityreview.com/">https://www.thecybersecurityreview.com</a></p></div></div></div></div></div></div> <style>.box-inner-design {z-index: 1033;background-color:#FFFFFF;text-align: center; top: 142px; position: fixed;width:40%;left:30%;}.box-design-message {background-color: #000000;bottom: 0;height: 100%; left: 0; margin: 0;opacity: 0.6; padding: 0; position: fixed;right: 0;top: 0;width: 100%; z-index: 1000;}#nofication-box{width:100%;height:40%;border:2px solid #000000;padding:5px;float:left; background-color:#FFFFFF;}.title{font-size:20px; font-weight:bold;float:left;padding:5px;font-family:Arial,Verdana,sans-serif;color:#000000;}.message{font-size:11px;text-align:left;padding-top:5px;padding-left:9px;margin:0; color:#000;}.headline{font-size:14px; font-weight:bold; float:left;padding-top:5px;padding-left:9px;margin:0;}.introduction{float:left;padding-top:5px;padding-left:9px;margin:0;}.fixed-content{font-size:12px;text-align:left;font-weight:bold;font-family:Arial, Helvetica, sans-serif;}.content-link{font-size:11px;float:left;padding-top:5px;margin:0;}.content-link a:link{color:#2d578d;}.message.content-link > a { color: #2d578d;}</style><script>function OnCopy () {$("#notification-restrict-message").show();return false;}function hide_message(){$("#notification-restrict-message").hide();}</script> <script src="https://www.thecybersecurityreview.com/jsweb/jquery.min.js"></script> <script src="https://www.thecybersecurityreview.com/jsweb/owl.carousel.min.js"></script> <script src="https://www.thecybersecurityreview.com/jsweb/jquery.waypoints.min.js"></script> <script src="https://www.thecybersecurityreview.com/jsweb/jquery.slicknav.min.js"></script> <script src="https://www.thecybersecurityreview.com/jsweb/masonry.pkgd.min.js"></script> <!-- Main --> <script src="https://www.thecybersecurityreview.com/jsweb/main.js"></script> <script src="https://www.thecybersecurityreview.com/jsweb/smart-sticky.js"></script> <script src="https://www.thecybersecurityreview.com/jsweb/theia-sticky-sidebar.js"></script> <script src="https://www.thecybersecurityreview.com/autopop/js/jquery_cookie.js"></script> <script src="https://www.thecybersecurityreview.com/autopop/js/custom.js"></script> <!-- CXO Slider Script tags --> <script src="/jsweb/jquery.easy-ticker.js"></script> <script>$(function(){$('.demo1').easyTicker({direction: 'up',easing: 'swing'});$('.demo3').easyTicker({visible: 1,interval: 4000});$('.demo5').easyTicker({direction: 'up',visible: 5,interval: 4000,controls: {up: '.btnUp',down: '.btnDown',toggle: '.btnToggle'}});});</script><!-- CXO Slider Script tags ends --> <script type="text/javascript"> $(document).ready(function() { var old_cookie=document.getElementById("region_val").value; var value = readCookie('countrycode'); console.log("old:"+old_cookie); console.log("new:"+value); if(value=="Europe"){var web_dom='europe';}else if(value=="APAC"){ var web_dom='apac';}else if(value=="CANADA"){ var web_dom='canada';}else{ var web_dom='';} if(old_cookie!=value && value !=null && old_cookie !="null"){ setTimeout(function(){ location.replace("https://www.thecybersecurityreview"+web_dom+".com"); location.reload(); }, 30); } });</script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10