Blog

Introducing Onyxia’s Cybersecurity Performance Management Platform, the AI-Powered CPM Platform That Means Business
Yehuda Kirschenbaum Yehuda Kirschenbaum

Introducing Onyxia’s Cybersecurity Performance Management Platform, the AI-Powered CPM Platform That Means Business

Introducing Onyxia’s Cybersecurity Performance Management Platform, the AI-powered CPM platform that means business. Our AI-powered platform provides CISOs with a high-level, unified view of their cybersecurity program and delivers actionable insights for high-performing cyber defense strategies that align with business objectives.

Read More
The Benefits of Choosing a SOC 2 Compliant Security Company
Yehuda Kirschenbaum Yehuda Kirschenbaum

The Benefits of Choosing a SOC 2 Compliant Security Company

SOC 2 is a widely recognized security standard that demonstrates an organization's commitment to safeguarding customer data and maintaining the highest level of security controls. At Onyxia, we are proud to be SOC 2 compliant, going the extra step to protect our partners' and clients' data.

Read More
The Top Cybersecurity News Stories This Month: May 2023
Yehuda Kirschenbaum Yehuda Kirschenbaum

The Top Cybersecurity News Stories This Month: May 2023

A lot of news about vulnerabilities found in Samsung, Apple and other Android devices, a Discord data breach and Meta takes down a ChatGPT related malware campaign. The month of May had no shortage of cybersecurity headlines.

Read More
The Critical Role of CISOs in Cybersecurity Governance
Yehuda Kirschenbaum Yehuda Kirschenbaum

The Critical Role of CISOs in Cybersecurity Governance

The growing importance of cybersecurity in corporate governance highlights the crucial role of the CISO in managing cyber risk. CISOs will now be expected to take on additional leadership responsibilities to manage periodic regulatory disclosure and continuously engage with their board of directors to provide necessary education and expertise.

Read More
Who Should the CISO Report to? It Depends.
Karen Mesoznik Karen Mesoznik

Who Should the CISO Report to? It Depends.

Recently, a LinkedIn post went viral as it posed an ‘age-old question’: “Where should the CISO report?” There is no definitive answer to this question but there is one important thing to keep in mind.

Read More
ChatGPT Enables Millions of Potential Cyber Attackers
Sivan Tehila Sivan Tehila

ChatGPT Enables Millions of Potential Cyber Attackers

While ChatGPT has captured the imagination of many and sparked discussions about the future role of humans in an increasingly automated world, it has also raised significant concerns about its possible impact on the field of cybersecurity.

Read More
Expanded Horizons: The Benefits of XDR
Guest User Guest User

Expanded Horizons: The Benefits of XDR

Networks experience a constant stream of activity from all connected devices. Keeping track of the goings-on across smaller networks poses a challenge for security teams, with this problem only magnifying as the network expands.

Read More
The Purview of a CISO
Guest User Guest User

The Purview of a CISO

Many industries function very much like a ship, be it a sailing ship of old or a modern spacecraft voyaging among the stars. Each person aboard the vessel has a different role to serve based on their unique skill set to contribute to the fulfillment of the mission.

Read More