OmniSecuritas and Kraken Tech Phillippines Sign Reseller Agreement
OmniSecuritas and Kraken Tech Phillippines Sign Reseller Agreement OmniSecuritas Technologies (https://omnisecuritas.com.ph) and Kraken Tech Philippines (https://krakentech.ph) have executed a Reseller Agreement, whereby Kraken Tech will resell OmniSecuritas/CYDEF...
CYDEF secures second patent, related to unique ‘Stack View’
CYDEF’s patented Stack View was developed to empower SOC analysts to perform threat hunting quickly and efficiently on 100% of telemetry collected, filling the significant gap left by other endpoint detection tools Ottawa, Canada, February 8, 2023 — CYDEF is pleased...
CYDEF among the world’s most innovative CyberTech companies, 2nd year in a row
CYDEF recognized in the prestigious CyberTech100 list for 2022. Ottawa, Canada, June 20, 2022 — CYDEF is pleased to announce its inclusion in FinTech Global’s prestigious CyberTech100 list, as one of the world’s top 100 most innovative cyber companies. The list...
OmniSecuritas Technologies and CYDEF partner to expand Cybersecurity Services in the Philippines
Ottawa, Canada, March 10, 2022 – CYDEF is pleased to announce an exclusive, long-term distributor agreement with OmniSecuritas Technologies, a cybersecurity Startup in the Philippines backed by Vista Land and Lifescapes (VLL).
CYBERSECURITY IN THE AGE OF RAPID DIGITIZATION
OmniSecuritas Technologies Inc. in partnership with CYDEF would like to invite you to our upcoming webinar this coming October 6, 2022, Thursday, 9:00am to 12pm Jakarta Time (10am to 1pm Manila time). In today’s era of rapid digitization, operating an effective...
YOU ARE INVITED!! INTRODUCING – OMNISECURITAS MANAGED ENDPOINT & THREAT DETECTION RESPONSE
Omnisecuritas Technologies Inc. in partnership with CYDEF would like to invite you to our upcoming webinar this coming July 6, 2022, Wednesday, 9:30am to 12nn. Today, operating an effective endpoint security program can be extremely challenging. The necessary tools...
March 2023 Blog
A Threat Intelligence Approach Versus a Threat Hunting Approach to Cybersecurity Have you ever tried three-dimensional chess? It is very hard to play and even harder to win. Cybersecurity is like that. In cybersecurity, it is no secret that the threat actors are...
February 2023 Blog
February 2023 Blog A Brief Overview of Threat Actors State-Sponsored Organized Crime Individuals/Insiders Hacktivists In 2023 we are...
January 2023 Blog
January 2023 Blog Cybersecurity and Leadership – Lessons Learned As we launch into 2023, I am reminded of some exemplary leaders that I had the privilege of working with over the almost 39 years of my professional career. If you are in a pensive mood, as one often is,...
December 2022 Blog
December 2022 Blog Observations from 2022 – A Year in the Life of a Cybersecurity Company I trust all the readers of this blog have had an enjoyable and restful holiday season. We wish you all the very best success and good health in 2023! As we look back on 2022 from...
November 2022 Blog
November 2022 Blog Government and Private Sector Cooperation in Cyberdefense and the Impact on Your Organization As 2022 draws to a close, we are seeing an emerging trend in the cybersecurity industry: the emergence of much more stringent laws and associated penalties...
October 2022 Blog
Dependency Versus Autonomy – What Are Cybersecurity Solution Vendors Seeking? In this month’s blog, I would like to explore the basic concept of ‘DEPENDENCY’ versus ‘AUTONOMY’ in the application of cybersecurity technology to solving common cybersecurity...
September 2022 Blog
What Honeybees Can Teach Us About Cybersecurity I would like to quote Gianna Whitver, Bees & Cybersecurity | VP of Marketing, Votiro | Co-Founder, Cybersecurity Marketing Society | Founder, LeaseHoney | Podcast Host for this month’s blog content. I am very...
August 2022 Blog
The Psychology of Cybersecurity. Cybersecurity is largely driven by psychology. What I mean by this, is that the threat environment is mostly comprised of human interactions and behaviors with a technological component behind it. It is a given that we need and benefit...
July 2022 Blog
Where’s the Beef? Many Endpoint Detection and Response (EDR) companies are very large and well provided with significant advertising budgets and creative staff to generate marketing campaigns that emphasize their Artificial Intelligence (AI), Machine Learning (ML) and...