Our latest blog posts
Kubernetes Security: Q/A with TraceRoute42
All statistics confirm that the popularity of Kubernetes and cloud-based applications in general is bound to increase. Just think that 94% of enterprise businesses are already using a cloud service.
This means that it’s importa...
Interview with Cameron Ashley - Ashbi Creative Studios
SafetyDetectives spoke with Cameron Ashley co-founder of Ashbi Creative Studios. We discussed tips and strategies for businesses on how to secure their website and protect it from hackers, and what to do if your site gets hacked. ...
Interview With Pieter Danhieux- Secure Code Warrior
Safety detectives speaks to Pieter Danhieux, CEO and co-founder of Secure Code Warrior to find out how they build a culture of security-driven developers by giving them the skills to code securely.
Please tell us about your flags...
Cybersecurity Performance Management & CnSight®: Q/A With Jesse Dean of TDI
Safety Detectives spoke with Jesse Dean, who is leading the development of integrated solutions in his role as Vice President of Solutions at TDI. Our discussion touched on the unique cybersecurity products offered by TDI, how TDI...
Network Automation and Cybersecurity: Q&A with BackBox
Cyberattacks have evolved into increasingly sophisticated forms of automation, with the result that even if companies attempt to protect themselves manually, the battle often turns into a war between humans and machines, with very...
Email Security Best Practices: Q/A with Barracuda Networks
For many businesses, the majority of cyber attacks come in the form of malicious emails, which makes email protection a priority in order to avoid any data losses.
It is not easy, though, to choose the right email protection to...
Interview With S. M. Nazmul Hasan - Symlex VPN
Safety Detectives spoke with S. M. Nazmul Hasan, CEO of Kolpolok Limited, to find out what inspired him to launch Symlex VPN and how they continue to grow in a competitive online security market.
Safety Detectives: Please tell...
What is Infrastructure Monitoring and How Does It Work? Q/A with LogicMonitor
Cloud computing offers many benefits over traditional data centers, so widespread adoption is an easy choice for many enterprises. However, there are some inherent security challenges that come with the cloud. In fact, cloud compu...
Remote Work And Cybersecurity: Q/A With Egnyte
Today’s work environment requires a lot of data sharing, which leads to an obvious increased risk of content theft, like the recent data leak that happened to PegasusEFB.
Businesses embracing smart working keep finding new ways...
Q&A With GK8
Safety Detectives: Please share your company background, how you got started, and your mission.
GK8: GK8 was founded by elite Israeli cyber intelligence veterans who previously protected the nation’s strategic assets, reporting...