Trends
Top hashtags
Top influencers
Top sources
Monthly report: October 2019
This month, The Essentials Report, has curated & analyzed the content published by 126 influencers like SearchSecurity.com and RSA Conference, discussing hashtags such as #cybersecurity , #ciso and #security.
Read our monthly report or learn more about Essentials.
What matters to our readers VS what matters to the rest of the world in October 2019
Popular with our readers
Best articles in October 2019
RSA Conference 2020 Opens Call for Submissions for RSAC Innovation
RSA® Conference, the world’s leading information security conferences and expositions, today announced that submissions for the 15th annual RSAC Innov
RSA Conference 2020 Opens Call for Submissions for RSAC Innovation
RSA® Conference, the world’s leading information security conferences and expositions, today announced that submissions for the 15th annual RSAC Innov
The Internet Is Overrun With Images of Child Sexual Abuse. What Went Wrong?
Online predators create and share the illegal material, which is increasingly cloaked by technology. Tech companies, the government and the authorities are no match.
The Internet Is Overrun With Images of Child Sexual Abuse. What Went Wrong?
Online predators create and share the illegal material, which is increasingly cloaked by technology. Tech companies, the government and the authorities are no match.
Cybersecurity & data privacy trends in 2020
2020 will be the year when multiple nascent cybersecurity trends converge.
Cybersecurity & data privacy trends in 2020
2020 will be the year when multiple nascent cybersecurity trends converge.
Evade Me If You Can: Unmasking Context-Aware Malware
Why are targeted attacks a critical threat to cybersecurity infrastructure?The threat actors behind targeted attacks have long-term goals in mind (political, monetary, trade secrets, etc.). ...
Evade Me If You Can: Unmasking Context-Aware Malware
Why are targeted attacks a critical threat to cybersecurity infrastructure?The threat actors behind targeted attacks have long-term goals in mind (political, monetary, trade secrets, etc.). ...
US Legislation Launches “Mind Your Own Business” Act
The U.S. legislation recently proposed Mind Your Own Business Act, which prosecutes top-level executives if their companies are found misusing citizens’ information and lying about it
US Legislation Launches “Mind Your Own Business” Act
The U.S. legislation recently proposed Mind Your Own Business Act, which prosecutes top-level executives if their companies are found misusing citizens’ information and lying about it
Tips for those of all ages interested in pursuing a career in cybersecurity
Today, we are facing a frightening shortage of cybersecurity professionals in the workforce. Specifically, this widening gap is expected to lead to 3.5
Tips for those of all ages interested in pursuing a career in cybersecurity
Today, we are facing a frightening shortage of cybersecurity professionals in the workforce. Specifically, this widening gap is expected to lead to 3.5
Former Twitter CISO shares his advice for IT security hiring and cybersecurity
Michael Coates, CEO & Co-Founder of Altitude Networks and the former CISO at Twitter, share best practices for building strong security teams and for starting a career in cybersecurity.
Former Twitter CISO shares his advice for IT security hiring and cybersecurity
Michael Coates, CEO & Co-Founder of Altitude Networks and the former CISO at Twitter, share best practices for building strong security teams and for starting a career in cybersecurity.
VMware builds security unit around Carbon Black tech
VMware has wrapped up its $2.1 billion buy of cloud-native endpoint security vendor Carbon Black to provide more comprehensive integrated security.
VMware builds security unit around Carbon Black tech
VMware has wrapped up its $2.1 billion buy of cloud-native endpoint security vendor Carbon Black to provide more comprehensive integrated security.