Get Our Newsletter
Intellyx – The Digital Transformation Experts – Analysts
  • OUR CONTENT
    • Cortex Columns
    • BrainBlog Posts
    • Brain Candy Briefs
    • Brain Dump Articles
    • News Mentions
    • Webinars & Events
    • Whitepapers
    • Thought Leadership Finder
  • Our Services
    • Advisory Offerings
    • Content Marketing Services
    • For Technology Vendors
    • For Business Execs
  • About Us
    • Analyst Team
    • Current Subscribers
    • Media Kit
    • Testimonials
  • CONTACT
    • Request an Inquiry
    • Download the Poster

Tags archive: CISO

Brain Candy

Squalify: Cyber Risk Quantification for CISOs and the Boardroom

February 6, 2026 0

An Intellyx Brain Candy Brief Squalify leverages a massive volume of cyber risk data from its parent company Munich Re to provide CISOs with a…

Brain Candy

RegScale: AI Assisted Productivity for Risk and Compliance Operations

September 18, 2025 0

An Intellyx Brain Candy Brief A big challenge for any organization is to monitor risk and compliance controls and policies. On top of that organizations…

CISO Magazine Article

What I learned at the Black Hat USA 2019 Conference

August 16, 2019 0

The phrase ‘black hat’ refers to a hacker with criminal intentions, so I expected my first trip to the Black Hat USA conference held in…

Tenable logo Brain Candy

Tenable: Decimating risk exposure through vulnerability responsiveness

May 15, 2019 0

An Intellyx Brain Candy Brief Tenable likely already has a presence somewhere in any CISO or security professional’s software suite with their ubiquitous Nessus security…

Nyotron logo - Intellyx Brain Candy Brain Candy

Nyotron: Positively paranoid cybersecurity in a world of unknown threats

January 4, 2019 0

An Intellyx Brain Candy Brief In the seemingly endless quest to keep up with an ever-changing cyberthreat landscape, Nyotron has taken an optimist’s path to…

BrainBlog

The Human Side of Cybersecurity

August 8, 2017 0

As the waves of ransomware hitting the shores of companies around the world prove, today’s cybersecurity balance still tips toward the bad guys. The odds…

Blog Post Mention

Arrested? My Hands Were Already Tied

September 2, 2015 0

By Satyam Tyagi Snake Oil and FUD The best question is asked by Jason Bloomberg in his latest Forbes posting on the Wyndham court case,…

AI Agent Conference

Start date: May 4, 2026
End date: May 5, 2026
All-day event
AI Agent Conference 2026 Event

TMForum DTW Ignite

Start date: June 23, 2026
End date: June 25, 2026
All-day event
ignite

RAISE Summit

Start date: July 8, 2026
End date: July 9, 2026
All-day event
raise image

AGNTCon + MCPCon Europe

Start date: September 17, 2026
End date: September 18, 2026
All-day event
AgntCon logo
Subscribe to our Cortex & Brain Candy Newsletters!
Download the Poster
JOIN OUR LINKEDIN GROUP!

Categories

  • Article 155
  • Blog Post Mention 1,375
  • Brain Candy 1,897
  • Brain Dump 11
  • BrainBlog 543
  • CIO Article 53
  • CISO Magazine Article 2
  • Cortex Newsletter 248
  • DailyIcoNews Article 22
  • DZone Article 12
  • Featured 783
  • Forbes Article 292
  • Infographic 12
  • News 574
  • Past Events 36
  • Podcast 72
  • SD Times Article 23
  • SiliconANGLE Article 101
  • TechBeacon Article 9
  • Techstrong Article 1
  • The New Stack Article 32
  • Translation 23
  • Uncategorized 285
  • Video 92
  • Webinars & Events 188
  • White Paper 209

Follow Us:

Contact Us:

  agility@intellyx.com
 +1-617-517-4999

The Fine Print

  • Code of Ethics
  • Terms & Conditions
  • Cookies, Privacy, & Security

Upcoming Events

AI Agent Conference

Start date: May 4, 2026
End date: May 5, 2026
All-day event
AI Agent Conference 2026 Event

TMForum DTW Ignite

Start date: June 23, 2026
End date: June 25, 2026
All-day event
ignite

RAISE Summit

Start date: July 8, 2026
End date: July 9, 2026
All-day event
raise image

AGNTCon + MCPCon Europe

Start date: September 17, 2026
End date: September 18, 2026
All-day event
AgntCon logo

Tag Cloud

2021 Awards Agile AI AIOps Analyst Award Analytics Artificial Intelligence Automation award Awards award winner Big Data Bitcoin Blockchain BPM Cloud cloud native Compuware Crypto Cryptocurrency Cybersecurity DevOps DigitalInnovator Digital Transformation Enterprise Architecture genAI Generative AI Hybrid IT Innovation Integration Intellyx award Internet of Things IoT IT Operations Kubernetes Low-Code Machine Learning Mainframe Modernization No Code observability RPA SD-WAN Security vendor award

Categories

  • Article 650
    • Brain Dump 11
    • CIO Article 53
    • CISO Magazine Article 2
    • DailyIcoNews Article 22
    • DZone Article 12
    • Forbes Article 292
    • SD Times Article 23
    • SiliconANGLE Article 101
    • TechBeacon Article 9
    • Techstrong Article 1
    • The New Stack Article 32
  • Blog Post Mention 1,375
  • Brain Candy 1,897
  • BrainBlog 543
  • Cortex Newsletter 248
  • Featured 783
  • Infographic 12
  • News 574
  • Past Events 36
  • Podcast 72
  • Translation 23
  • Uncategorized 285
  • Video 92
  • Webinars & Events 188
  • White Paper 209
© Intellyx BV. All rights reserved.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Subscribe to Our Newsletter!

We will send you a weekly digest of our latest thought leadership and articles on disruptive vendors and technology.

  Thank you for Signing Up

Please correct the marked field(s) below.

1,true,6,Contact Email,2 1,false,1,First Name,2 1,false,1,Last Name,2

Read Our Recent Cortex and BrainCandy Newsletters