Bianca Soare's profile photo

Bianca Soare

Featured in: Favicon g2.com Favicon learn.g2.com

Articles

  • Sep 20, 2024 | learn.g2.com | Jasmine Kharbanda |Ludovic Rembert |John Funk |Bianca Soare

    The zero-sum game between cyber adversaries and defenders is now becoming lopsided. The advent of artificial intelligence (AI) was nothing less than revolutionary. It promised efficiency, accuracy, speed, and agility, making businesses keen on using the technology to build their competitive edge. However, the same technology is now being used by cybercriminals to cause widespread disruption, threatening us all.

  • Mar 13, 2024 | learn.g2.com | John Funk |Dan Fries |Christopher Gerg |Bianca Soare

    The role of help desks continues to expand, and now that hackers see them as potential weak links, companies need to improve their cybersecurity capabilities. Not long ago, a hacking group known as Scattered Spiders targeted a Las Vegas casino’s help desk to gain access to valuable and sensitive data, millions in financial losses and a sullied reputation.

  • May 23, 2023 | heimdalsecurity.com | Bianca Soare

    The increase of cybersecurity incidents brings along a higher demand for enhanced security protections. Thus, in the attempt of preventing unauthorized third parties from accessing their accounts and sensitive data, companies are increasingly turning to biometric authentication. Contemporary Identity and Access Management (IAM) technologies have moved beyond basic login methods based on usernames and passwords.

  • Apr 20, 2023 | heimdalsecurity.com | Bianca Soare

    Endpoint detection and response (EDR) represents a collection of integrated endpoint security solutions that combine data collection, data analysis, forensics, and threat hunting, with the end goal of finding and blocking any potential security breaches in due time.

  • Mar 8, 2023 | heimdalsecurity.com | Bianca Soare

    Identity management has become an essential aspect of cybersecurity as businesses struggle to protect their sensitive data from cyber threats. To shed some light on this topic, in this article, we’ll help demystify the key differences between PIM (Privileged Identity Management), PAM (Privileged Access Management), and IAM (Identity and Access Management), explain how these terms differ, and how and why you should integrate them into your environment.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →