2nd Annual Milwaukee Cybersecurity Summit

Author(s):

June 12, 2025 | 7:30am – 6:00pm | Milwaukee, Wisconsin Hyatt Regency Milwaukee 333 West Kilbourn Avenue Milwaukee, Wisconsin The 2nd Annual Milwaukee Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered … Read more

6 Signs You Need to Improve Your Enterprise Security

Author(s):

Daisy Alina, Author, Animus webs

Enterprise Security

In an era where technology lies squarely at the heart of corporate operations, a defense against the pervasive threat of cybercrime is no longer optional but essential. The escalating complexity of cyber-attacks calls for a proactive, diligent response that leaves no stone unturned. But, as the urgency for protection escalates, do you fully grasp the … Read more

5 Common Cybersecurity/IT Mistakes in Your Small Business

Author(s):

Gloria Martinez, President, WomenLed

5-common-mistakes-martinez-

The world is filled with hackers and other criminals who hunt the web for unprotected small and medium-sized businesses.  Cybercriminals understand that many businesses are not equipped to manage a breach, leaving them more vulnerable to attacks and less likely to respond. But that doesn’t mean your company has to remain passive in the fight … Read more

The State of Server-Side Request Forgery Risks in 2022

Author(s):

Harry Wilson, Head of Digital Marketing Department, Globex Outreach

server-side request forgery

Perhaps one of the best Black Hat talks in recent years was renowned web security researcher Orange Tsai’s presentation about bypassing Server-Side Request Forgery (SSRF) defenses. Together with his team, Tsai proposed a “very general attack approach” to discover numerous zero-days in built-in libraries of widely-used programming languages including Java, PHP, Python, Perl, JavaScript and … Read more

Why Data Protection Must Be a Part of Every Cybersecurity Strategy

Author(s):

Ahsan Siddiqui, Director, Product Management, Arcserve

Data Protection - Ahsan Siddigui

Widespread transition to remote/hybrid work creates vast opportunities for cyber attackers. With much more data being stored in the cloud and employees toiling away in less-secure home-office environments, ransomware attacks have skyrocketed. All told, ransomware struck 66% of midsize organizations in 2021, up from 37% the previous year according to the State of Ransomware 2022 … Read more

Application Security Should Be A Badge Of Honor, Not A Wall Of Shame

Author(s):

Mark Hamill, Director of Product Management, Cobalt

Application Security

Cybersecurity news is a curious thing.  For the most part it’s bad news.  Companies have been breached, risks are ever increasing and another billion-dollar crypto raid is under investigation.  Feels like we have enough to be worried about in 2022 without adding more. Application security is a category within a category and has been top … Read more

Fixing Vulnerabilities at Speed—How Engineering and Security Can Achieve True DevSecOps

Author(s):

Jay Paz, Senior Director of Delivery, Cobalt

Engineering and Security

What happens when two distinct teams with varied technological expertise, different incentive structures and contrasting priorities converge?—the answer is usually tension. During a recent discussion with colleagues, a completely different result was experienced. ‘Camaraderie’ is the word that immediately comes to mind when thinking about the veteran DevSecOps/engineering and security leaders. Sure there are still … Read more