Skip to main content

Posts about Articles

Why your security strategy needs to be preemptive

Q&A on preemptive cybersecurity with CybelAngel’s CISO Todd Carroll Originally published on betanews.com As cyberattacks become more sophisticated, so traditional security techniques may no longer be up to the task of protecting systems. What’s needed is an approach that can spot the routes an attacker may use and help close them down. We spoke to […]

supply chain cybersecurity
Supply Chain Cybersecurity – The Case for Outside-in Exposure Monitoring

Article is originally from teiss.co.uk Camille Charaudeau at CybelAngel explains why organisations desperately need an ‘outside-in’ approach to security  In these days of rapid cloud migration and endless digital supply chains, the idea of a secure perimeter is well and truly dead. Nevertheless, organisations still naturally tend to adopt an internal approach to security, looking out […]

Left to right: U.S. House Speaker Nancy Pelosi, Pfizer CEO Albert Bourla and CybelAngel CEO Erwan Keraudy
An International Cybersecurity Collaboration Like No Other

CybelAngel CEO Erwan Keraudy advances EASM and preemptive cybersecurity with distinguished US and French cybersecurity delegation The French-American Foundation’s 2022 Cyber Security Conference, held November 29 to December 1, brought together nearly 100 leading cyber security experts and thought leaders from France and the U.S. to discuss the most pertinent cyber security challenges from both […]

How to Avoid Inheriting a Data Breach During a Merger/Acquisition

Originally posted on Em360 Mergers and acquisitions. A practice the tech industry itself is certainly no stranger to, M&A’s happen all the time and mark the consolidation of companies. Companies can take on assets, share capital and equity interests; but they can inherit serious data risks too – and that’s a problem. In this episode […]

The road to shadow IT is paved with good intentions
How to Manage the Risks and Costs of Shadow IT

Do your employees use personal drives to store or share corporate data? Do they forward corporate files to their personal email? Perhaps they’ve created repositories for document gathering and sharing for a joint project with a vendor…or installed a handy little app or extension they found online… If so, congratulations: You’ve probably got shadow IT. […]

Quantifying M&A Cybersecurity Risk

Sometimes they get it right, sometimes they don’t With operations in transition, companies going through Merger and Acquisition (M&A) activities are frequently targeted for cyberattack. The high-value data of publicly-held companies is especially vulnerable, as it offers potential for media coverage and both short- and long-term rewards for threat actors. Not surprisingly, acquirers with mature […]