Janine Saintos’ portfolio of work in security, as well as her unique business perspectives, make her content a favorite of C-suite audiences. By combining her knowledge of business and security, Janine helps leaders develop an understanding of a wide range of related topics. Building cyber-resilient organizations, developing business continuity and disaster recovery plans, and cybersecurity due diligence for mergers and acquisitions are some of the themes addressed in her publications.
In an interconnected world where digital breaches are increasingly sophisticated, the spotlight is on supply chains' cybersecurity vulnerabilities. As revealed by a recent Risk Ledger study at Infosecurity Europe, almost half of organizations faced multiple cyber incidents linked to their
In recent developments, a critical spotlight has been cast on Samsung's MagicInfo 9 Server software, which is essential for managing digital signage displays commonly used in public and corporate environments. The current dilemma facing cybersecurity experts and administrators revolves around
In today's digital landscape, mainframe security remains a top priority for organizations seeking to protect their data against emerging threats. Malik Haidar, a seasoned cybersecurity expert, sheds light on the intricacies of mainframe vulnerabilities and the role of cookie management in
In today's fast-evolving digital landscape, enterprises are racing to modernize their applications to stay competitive. This modernization often involves implementing industry-standard protocols such as OpenID Connect (OIDC) and Security Assertion Markup Language (SAML) to enable single
In the rapidly evolving landscape of cybersecurity, Malik Haidar stands out as an authority, merging deep technical expertise with a keen understanding of business dynamics. With years of experience mitigating threats in multinational corporations, he brings a unique perspective to cybersecurity
As artificial intelligence (AI) technologies permeate various facets of society, ensuring their secure and ethical deployment becomes paramount to sustaining public trust. The rapid integration of AI into essential systems necessitates robust security frameworks designed to mitigate risks and
In the fast-evolving landscape of cybersecurity, phishing remains one of the most formidable threats in 2025, relentlessly challenging security protocols. To shed light on critical insights and the transformational shifts necessary to counter these threats, we spoke with Malik Haidar, a seasoned
SecurityNews uses cookies to personalize your experience on our website. By continuing to use this site, you agree to our Cookie Policy