Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Xalient achieves Top 10 in The Sunday Times Best Places to Work Awards

Xalient voted as one of the top 10 best loved companies in the big organisations category. Xalient employees rate job satisfaction, happiness, wellbeing, empowerment and information sharing all 'excellent'. Xalient recognised in the Spotlight Award for the Best Places to Work for Women.

A Career in Cyber Security: Navigating the Path to a Digital Safekeeping Profession

Cyber security represents not just a robust field teeming with opportunities but also an increasingly pivotal aspect of global digital infrastructure. With the prevalence of digital threats, your expertise in this domain can lead to a rewarding and socially significant cyber security career. Employers across various sectors seek professionals who can protect their data and systems, offering a broad market for your skills.

Top 10 Best-Known Cybersecurity Incidents and What to Learn from Them

Negligent or malicious behavior by those who have legitimate access to your systems can be more devastating to your company than the efforts of outside attackers. The 2023 Cost of Insider Risk Global Report by the Ponemon Institute shows that cybersecurity incidents caused by insiders through negligence, credential theft, and malicious intent had an average cost per incident of $505,113, $679,621, and $701,500, respectively.

The dangers of enterprise attack surface expansion: Lessons from 5 major breaches

Enterprise attack surface expansion has become a focal point for IT security teams. The relentless pursuit of securing every endpoint and countering new threats with the latest technology is not just costly; it's also unsustainable. Despite these efforts, breaches continue to occur, often through new or unorthodox attack vectors that bypass traditional perimeter defenses.

CyberArk at 25: Udi Mokady on Milestones, Identity Security and Humility

Let’s head back for a moment to when some of us were partying like it’s 1999, in 1999. Among that year’s notable milestones were the release of The Matrix, the introduction of the euro – and the impending clock turn to 2000 (aka Y2K), which propelled prophylactic tech upgrades far and wide. Simpler times – at least in retrospect.

EP 52 - Built to Last: CyberArk's 25-Year Innovation Evolution w/ Founder and Executive Chairman Udi Mokady

In this episode of the Trust Issues podcast, host David Puner interviews CyberArk Founder and Executive Chairman Udi Mokady on the occasion of the company’s 25th anniversary. They discuss that milestone and reflect on CyberArk’s growth to becoming the global leader in identity security and the ever-evolving threat landscape – and how the company has scaled to meet it. Udi shares his insights on the company’s culture, values, philosophies and lessons he has learned.

Empowering Citizen Developers with Zenity's AI Tools

Empowering Citizen Developers: Using Zenity’s Tools in AI-Driven Development The ability to develop applications, automations, and bots without the need for custom coding, has resulted in a paradigm shift for cybersecurity. Now, more than ever, citizen developers can design and implement solutions without the need for a traditional coding background. Due to innovative tools and platforms, as well as the integration of AI, development is now faster, more accessible, and more efficient.

Empowering Governance in AI-Driven Citizen Development

AI is at the heart of technology democratization. As AI tools become more accessible, individuals and organizations have begun to utilize AI copilots to build their own apps, automations and increase productivity in their jobs. This transformation has come to be known as the next evolution of low-code and no-code development. This development promises to accelerate innovation, enhance productivity, and solve complex problems more efficiently than ever before.