Media Database
>
Alissa Irei

Alissa Irei

Senior Writer at SearchSecurity

Contact this person
Email address
a*****@*******.comGet email address
Influence score
53
Phone
(XXX) XXX-XXXX Get mobile number
Location
United States
Languages
  • English
Covering topics
  • Computers & Technology

View more media outlets and journalists by signing up to Prowly

View latest data and reach out all from one place
Sign up for free

Recent Articles

techtarget.com

How to spot and expose fraudulent North Korean IT workers

North Korean IT workers are using stolen identities to pose as Americans and land high-paying remote IT jobs. Learn how to mitigate this growing cyber-risk.
techtarget.com

Top 10 ransomware targets by industry

Today’s top ransomware targets include organizations in the media, retail and energy sectors. Learn which 14 industries have the highest attack rates.
techtarget.com

QR Code Phishing: 14 Quishing Prevention Tips

Threat researchers have found evidence of large-scale quishing activity. Here’s what users and organizations should know about email-based QR code phishing.
techtarget.com

3 types of deepfake detection technology and how they work

Deepfakes put enterprises at risk of theft, data breaches and compliance issues. Learn about the deepfake detection technology that aims to stop them.
techtarget.com

How to define cyber-risk appetite as a security leader

To effectively manage cyber-risk, an organization must first define its cyber-risk appetite. Learn how, and explore a cyber-risk appetite statement example.
techtarget.com

How to assess SOC-as-a-service benefits and challenges

With SOC as a service, organizations can outsource security monitoring and incident response functions via the cloud. Explore key benefits and challenges.
techtarget.com

How AI-driven SOC tech eased alert fatigue: Case study

Alert fatigue is real, and it can cause big problems in the SOC. Learn how generative AI can improve security outcomes and reduce analysts’ frustration in this case study.
techtarget.com

How AI-driven patching could transform cybersecurity

At RSAC 2024, a Google researcher described how the search giant has already seen modest but significant success using generative AI to patch vulnerabilities.
techtarget.com

3 ways AI is transforming cloud security, according to experts

Generative AI only recently burst into the collective consciousness, but experts say it is already changing cloud security -- on both the defensive and offensive sides.
techtarget.com

Cybersecurity market researchers forecast significant growth

The cybersecurity market is growing and changing at a rapid pace, leading to major opportunities for vendors, heightened confusion for buyers and new challenges for CISOs.
techtarget.com

Shadow AI poses new generation of threats to enterprise IT

AI is all the rage -- and so is shadow AI. Learn how unsanctioned use of generative AI tools can open organizations up to significant risks and what to do about it.
techtarget.com

Incident response automation: What it is and how it works

Explore the capabilities and limitations of incident response automation and how it can benefit security operations teams.
techtarget.com

Cybersecurity budgets lose momentum in uncertain economy

Organizations’ increasing prioritization of cybersecurity has protected most programs from major budget cuts. Even so, many CISOs are feeling the pinch.
techtarget.com

Smart contract benefits and best practices for security

Explore the significant benefits of smart contracts in the enterprise, as well as best practices to keep them secure.
techtarget.com

How Target built its DevSecOps culture using psychology

Learn how Target used organizational psychology principles to create a DevSecOps culture that works.
techtarget.com

5 ChatGPT security risks in the enterprise

Explore five of the top ChatGPT security risks and what they could mean for enterprises.
techtarget.com

7 steps for implementing zero trust, with real-life examples

Implementing zero-trust security is one of the most important -- and most challenging -- initiatives an enterprise can undertake. Learn how to get started.
techtarget.com

A 'CISO evolution' means connecting business value to security - Te...

The CISO Evolution: Business Knowledge for Cybersecurity Executives offers critical business lessons through a security lens. Learn more in this author Q&A.
techtarget.com

Case study: Scaling DevSecOps at Comcast

From a small pilot program to DevSecOps at scale, this case study explored how Comcast injected app security into its DevOps pipeline. Learn more.
techtarget.com

An introduction to binary diffing for ethical hackers - TechTarget

Binary diffing is a useful tool in the ethical hacker’s arsenal. This excerpt teaches aspiring penetration testers and red teamers how to get started.
techtarget.com

Unethical vulnerability disclosures 'a disgrace to our field' - Tec...

The cybersecurity field needs more people who use their powers for good, the lead author of Gray Hat Hacking: The Ethical Hacker’s Handbook, Sixth Edition says.