Fenix24 Launches Argos99 to Enhance Cyber Resilience and Accelerate Recovery
Argos99 helps solve the challenge of mapping dependencies, tracking, patching, and managing distributed IT and cybersecurity assets.
Argos99 helps solve the challenge of mapping dependencies, tracking, patching, and managing distributed IT and cybersecurity assets.
Brandon Williams, CTO of Conversant Group, shares with The Last Watchdog predictions for 2025’s security landscape based on 2024’s cyber threats in part two of the four-part roundtable series.
Heath Renfrow, CISO and Co-Founder at Fenix24, shares insights with Information Security Buzz about the limitations of outside audits in assessing IT controls in light of recent threats from Chinese hackers.
Heath Renfrow, CISO and Co-Founder at Fenix24, shares his insights with Security Magazine regarding the FCC’s initiative aimed at helping communications service providers implement annual cybersecurity defense plans following the threat from recent Chinese hackers.
Heath Renfrow, co-founder and CISO at Fenix24, discusses with SC Media the potential success of the FCC’s new “Declaratory Ruling” but would not succeed if it was a regulatory requirement.
John Anthony Smith, Founder and CSO of Conversant Group, shares insights with Security Intelligence, emphasizing that the real disruptors in the field of cybersecurity are the threat actors.
David Smith of Fenix24 shares with A&O Shearman how businesses must recover their virtual environments after a threat actor compromise, even when backups are available.
Conversant Founder & CSO, John Anthony Smith, explains to Inc. Magazine how and why businesses should build cyber resiliency in modern business.
John Anthony Smith, the Conversant CSO and founder, discusses with Digital IT News the essential steps companies should implement before and after a breach to leverage their strong recovery strategies and minimize the most expensive consequence: disruption to business operations.
Conversant Founder and CSO, John Anthony Smith, discusses with Information Security Buzz the critical difference between breach recovery and awareness. He emphasizes proactive measures to lessen business effects and ensure smoother operations in honor of Cybersecurity Awareness Month.