![Digitalmarketing transition](https://d14tal8bchn59o.cloudfront.net/cYuit-qjQ5dY4l7yCYg1r2Z4cMl0GItS7_VbVgQlnRQ/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/6584848/digitalmarketing-transition_original.png)
PROACTIVE EDITORIAL COVERAGE
![It brew](https://d14tal8bchn59o.cloudfront.net/gD_9n3t9jBL8S619M87XDfdvaES4X0uI_8B9w3yIKXY/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21118638/It_Brew_original.png)
Q&A with Lynn Dohm: Hacking the glass ceiling
![Wall street journal](https://d14tal8bchn59o.cloudfront.net/oOPrB9JSJXr60nvtKEPVQ3RfoSV28_U7Birf8oIjTOo/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21118639/Wall_Street_Journal_original.png)
In the Future, There Will Be No Passwords— Because You Keep Giving Yours Away
![Itpro today](https://d14tal8bchn59o.cloudfront.net/6_9lF2znVh2AFCWZQ2NFC3kru1gYhZ0RFHgEVVsT48w/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21118938/ITPro_Today_original.png)
Do You Have What It Takes to Be a CISO? Take the Personality Quiz
![Cyberjack podcast](https://d14tal8bchn59o.cloudfront.net/B9Zccd0IIRzn3Ep_GYXPKlyDMB89llem7QaJHsWfTH8/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21118943/Cyberjack_Podcast_original.png)
The Importance of Diversity of Thought - Larry Whiteside Jr., RegScale
![Career notes cw](https://d14tal8bchn59o.cloudfront.net/zR-Bual54qtyPgW9dol_WlS_Yq1MfsxDf5CmYMLQX1Q/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21118945/Career_Notes_CW_original.png)
Nicole Sundin: Women helping women. [Chief Product Officer]
![Cybernews (1)](https://d14tal8bchn59o.cloudfront.net/SzJ1tNUITmgJjxHIVp0k8DvnDjXSa8lXPUbSxA3jJXM/w:960/plain/https%3A%2F%2F02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com%2Fsites%2F66907%2Fphotos%2F21118951%2Fcybernews_%25281%2529_original.png)
I’m the only woman at cybersecurity executive meetings – and that’s sad
![Us news world report (1)](https://d14tal8bchn59o.cloudfront.net/Gfz3xKKtc_kuoIkt5Uj_-o9Q-PYLMOwfmPVcVMVLJ_g/w:960/plain/https%3A%2F%2F02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com%2Fsites%2F66907%2Fphotos%2F21118997%2FUS_News___World_Report_%25281%2529_original.png)
Best Password Managers in the UK
![Gobankingrates](https://d14tal8bchn59o.cloudfront.net/fNHzixqUNQupmU8GG6z5-727Hx0t-oLjWXZBlhwvy9k/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119262/Gobankingrates_original.png)
6 iPhone Tips To Keep Thieves From Wiping Out Your Bank Account
RESEARCH DRIVEN EDITORIAL COVERAGE
![Wsj pro cybersecurity](https://d14tal8bchn59o.cloudfront.net/tyrV3lT1aXy_t2A7xdwiD4iiTpHVmANPmlxWAbKoWFA/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119003/WSJ_Pro_Cybersecurity_original.png)
Cyber Chiefs Seeking Board Seats Have Their Work Cut Out for Them
![Cso (1)](https://d14tal8bchn59o.cloudfront.net/DJ7x87TV-EW9yXaYwhkUNAh9b5BOFpzRdTAA-KOR1Xs/w:960/plain/https%3A%2F%2F02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com%2Fsites%2F66907%2Fphotos%2F21119016%2FCSO_%25281%2529_original.png)
Boys’ club mentality still a barrier to women’s success in cybersecurity careers
![Dark reading (1)](https://d14tal8bchn59o.cloudfront.net/nGqbp9WfpMWCr_-5M2mPiYruD341XqWhkEwdFBgqpdA/w:960/plain/https%3A%2F%2F02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com%2Fsites%2F66907%2Fphotos%2F21119152%2FDark_Reading_%25281%2529_original.png)
Google Drive Deficiency Allows Attackers to Exfiltrate Workspace Data Without a Trace
![Axios (1)](https://d14tal8bchn59o.cloudfront.net/QF0zIt_FC8F2Kua0szAenZSuPnABET721_w5uLa-omM/w:960/plain/https%3A%2F%2F02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com%2Fsites%2F66907%2Fphotos%2F21119153%2FAxios_%25281%2529_original.png)
Human error is threatening Okta passwords, researchers warn
![Wired](https://d14tal8bchn59o.cloudfront.net/pa7Rc2twAt9PPpZD5YzfI62zV_k5X43DCLesrc90zsk/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119243/Wired_original.png)
A New Trick Uses AI to Jailbreak AI Models—Including GPT-4
![Cnbc](https://d14tal8bchn59o.cloudfront.net/8W_EI3VXwxzIOdyzX1mJeiAjsAwNg7v8iyKy6F2GiQA/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119249/CNBC_original.png)
Cybersecurity experts have become targets for board seats
![Foxnews](https://d14tal8bchn59o.cloudfront.net/f4OTvGr2BOa5Kzyjj4xs6pcN4LPd1Z5zLcpofw7ZNTA/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119255/FoxNews_original.png)
Thousands of imposter websites discovered mimicking top brands to steal your banking info
NEWS-DRIVEN EDITORIAL
COVERAGE
![Forbes](https://d14tal8bchn59o.cloudfront.net/gZ9_i0vcUGYk-IBzDdHixK6fQ62Mxj07gpzWXBUxw0Q/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119908/Forbes_original.png)
This Cloud Software Startup Used By The U.S. Air Force Just Raised $30 Million From VCs And The CIA
![Cio](https://d14tal8bchn59o.cloudfront.net/TBg7ufKSv_rJDx-zf8Hn6cSXlIgs_lkVtaCzQ5RI72g/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119920/CIO_original.png)
The biggest enterprise technology M&A deals of the year
![Siliconangle](https://d14tal8bchn59o.cloudfront.net/Z4SoSQg_7Q9IditmIABuZfBAGab7bKuvLqFDBm-CMMY/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119975/SiliconAngle_original.png)
Cribl sets out to fix IT observability lock-in with $35M from Sequoia and CRV
![Venturebeat](https://d14tal8bchn59o.cloudfront.net/fkFDnDekBUgx3eGhhXQwMdfu6zkIxFIpC1RWrVkB6a4/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119979/VentureBeat_original.png)
Cloud incident response nets another $45M with Mitiga’s latest funding
![Techcrunch](https://d14tal8bchn59o.cloudfront.net/50tRkvk6kdNjUb9KZPf2v9EaxD4a4PcqgGasMK3yJCc/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119983/TechCrunch_original.png)
Cloud security vendor Mitiga lands $45M, valuing the company at over $100M
![Fortune termsheet](https://d14tal8bchn59o.cloudfront.net/1T362MSy7cCxZ_yGY8GWz4uYhQPATg1CfeQnSN5qxsY/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119985/Fortune_TermSheet_original.png)
A new Paradigm? The crypto VC fund insists it’s not pivoting to A.I., but some investors and founders are frustrated
![Wsjpro venture capital](https://d14tal8bchn59o.cloudfront.net/GvFk04oBH2yxDVbf4ekeMfpr7YzpPSiy1O32vUD2rLQ/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119995/WSJPro_Venture_Capital_original.png)
VC Daily: Silicon Valley Drug Use; Generative AI Risk Tolerance; Tiny PE Deals
THOUGHT LEADERSHIP
BYLINES
BYLINES
![Venturebeat](https://d14tal8bchn59o.cloudfront.net/fkFDnDekBUgx3eGhhXQwMdfu6zkIxFIpC1RWrVkB6a4/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119979/VentureBeat_original.png)
AI in OT: Opportunities and risks you need to know
![Venturebeat](https://d14tal8bchn59o.cloudfront.net/fkFDnDekBUgx3eGhhXQwMdfu6zkIxFIpC1RWrVkB6a4/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119979/VentureBeat_original.png)
How to mitigate security threats and supply chain attacks in 2023 and beyond
![Information week](https://d14tal8bchn59o.cloudfront.net/aM0_Vt7J9yR0eOZLpBvNAzEPGudCB6pyU-tGFaA-l8Q/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21120119/Information_Week_original.png)
SEC Ruling Is a Win for Citizens’ Digital Information
![Security boulevard (1)](https://d14tal8bchn59o.cloudfront.net/7nTw2RqTHzpLplRUEwggq7ev29ouQ_-OXRGiZ3aCf2w/w:960/plain/https%3A%2F%2F02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com%2Fsites%2F66907%2Fphotos%2F21120120%2FSecurity_Boulevard_%25281%2529_original.png)
Buyers Beware: Cybercriminals Target Your Online Credentials
![Security](https://d14tal8bchn59o.cloudfront.net/j3aKuBHGhe9_zhhEirp7UdEVy-1OYoo2wcDZm45b7Q4/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21120263/Security_original.png)
8 identity management best practices to have in place
![Dark reading (1)](https://d14tal8bchn59o.cloudfront.net/nGqbp9WfpMWCr_-5M2mPiYruD341XqWhkEwdFBgqpdA/w:960/plain/https%3A%2F%2F02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com%2Fsites%2F66907%2Fphotos%2F21119152%2FDark_Reading_%25281%2529_original.png)
Top Takeaways From Table Talks With Fortune 100 CISOs
\
![Cpo magazone](https://d14tal8bchn59o.cloudfront.net/Wp9Gm_QDFmr201zmFDxDzYf0ndMaLNFiVEUGgaE4T6g/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21120267/CPO_Magazone_original.png)
How Does Identity Transport Across Privacy Jurisdictions?
![Sc media](https://d14tal8bchn59o.cloudfront.net/BJZvn8Il33vheET_t6H5uPNvKtnzVZmc3_YLU-cjf1o/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21120272/SC_Media_original.png)
Five tips for securing Slack and Microsoft Teams
THOUGHT LEADERSHIP
RAPID RESPONSE
![Venturebeat](https://d14tal8bchn59o.cloudfront.net/fkFDnDekBUgx3eGhhXQwMdfu6zkIxFIpC1RWrVkB6a4/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119979/VentureBeat_original.png)
SEC’s controversial cybersecurity disclosure warning: What enterprises need to do now
![Wall street journal](https://d14tal8bchn59o.cloudfront.net/oOPrB9JSJXr60nvtKEPVQ3RfoSV28_U7Birf8oIjTOo/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21118639/Wall_Street_Journal_original.png)
How Will the SEC’s Pursuit of SolarWinds Affect Cyber Chiefs? Readers Weigh In
![Axios (1)](https://d14tal8bchn59o.cloudfront.net/QF0zIt_FC8F2Kua0szAenZSuPnABET721_w5uLa-omM/w:960/plain/https%3A%2F%2F02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com%2Fsites%2F66907%2Fphotos%2F21119153%2FAxios_%25281%2529_original.png)
Security leaders fear liability risks as regulators target cyber defense failures
![Infoworld](https://d14tal8bchn59o.cloudfront.net/w27TiHcfcJ2bBeS4yY_jDHtq8G3enJ7I9W7DC3OpgVA/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21120348/Infoworld_original.png)
What app developers need to do now to fight Log4j exploits
![Forbes](https://d14tal8bchn59o.cloudfront.net/gZ9_i0vcUGYk-IBzDdHixK6fQ62Mxj07gpzWXBUxw0Q/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119908/Forbes_original.png)
What Biden's New Executive Order Could Mean For the Future Of AI
![Techcrunch](https://d14tal8bchn59o.cloudfront.net/50tRkvk6kdNjUb9KZPf2v9EaxD4a4PcqgGasMK3yJCc/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119983/TechCrunch_original.png)
Early impressions of Google’s Gemini aren’t great.
![Techstrong](https://d14tal8bchn59o.cloudfront.net/1rBI6KfkBGkTJHAom-YuIuS49cDTZ-LIV_lMX8tnmBM/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21120359/Techstrong_original.png)
2023 Trends in Identity Security Report – Jeff Reich, Identity Defined Security Alliance
![Cio](https://d14tal8bchn59o.cloudfront.net/TBg7ufKSv_rJDx-zf8Hn6cSXlIgs_lkVtaCzQ5RI72g/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21119920/CIO_original.png)
Threat actors can use ChatGPT, too. Here’s what businesses should watch
![Mashable](https://d14tal8bchn59o.cloudfront.net/TS9VMCnzaiYj91nCZnG_IcmFJN6631eCPfXmnV05vrg/w:960/plain/https://02f0a56ef46d93f03c90-22ac5f107621879d5667e0d7ed595bdb.ssl.cf2.rackcdn.com/sites/66907/photos/21120373/Mashable_original.png)
OpenAI's Sam Altman breaks silence on AI executive order
Take The First Step Towards Online Success!
Contact Silver Jacket Communications for a free consultation.