Onyxia Blog

The image is a blank white background with no visible objects or details.

Featured Blog

Introducing Nexa: The AI Agent Redefining Preemptive Cyber Resilience

Nexa transforms how CISOs and security teams interact with their data and asset inventories....

All Categories

Company News

Product Releases

Partnerships

Current Events

Security Trends

Webinar Recaps

Karen Mesoznik Karen Mesoznik

The Top CISO Stories From Around the Web: April

From how Google Cloud’s Office of the CISO is shaping the future to a report that only 5% of businesses have a cyber expert, there was a mass of news stories this month related to the plights and success stories that CISOs are experiencing. Here are the top 5 CISO news stories that emerged this April.

Read More
Karen Mesoznik Karen Mesoznik

The Top CISO Stories From Around the Web: March

A cyber attack was committed on Intermountain Health, CEOs and CISOs have more to discuss than ever before, and AI is changing everything. Read on for all of this month’s top CISO stories.

Read More
Karen Mesoznik Karen Mesoznik

The Benefits of Cybersecurity Collaboration: Achieving a Unified and Strategic Approach

The effects and benefits of cybersecurity collaboration are major and far-reaching. The effects, from increased visibility into security posture to even as far as communication at the business level, can help your security program flourish. Some of the added benefits with cybersecurity collaboration include better informed decision-making and streamlined compliance management. Check out our blog post about cybersecurity collaboration to pursue more details!

Read More
Karen Mesoznik Karen Mesoznik

The Top CISO Stories From Around the Web: February

From the CISO’s struggle with their new role that comes with C-suite status to “10 Security Metrics Categories CISOs Should Present to the Board” from a new book for CISOs by CISOs, there were plenty of news stories this month that highlighted the most pressing issues CISOs are facing. Here are the top 5 CISO news stories that emerged this February

Read More
Karen Mesoznik Karen Mesoznik

How CISA Defines Cybersecurity Performance Goals (CPGs)

The release of Cybersecurity Performance Goals (CPGs) by CISA aims to increase organizations' cyber maturity, helping organizations gain confidence in their security and guiding them through the process of reducing business risk. Learn more about how these goals are defined and their impact thus far.

Read More
Karen Mesoznik Karen Mesoznik

The Top CISO Stories From Around the Web: January

The top CISO news stories for January ranged from the CISO’s struggle for C-suite status to a case for why CISOs are ‘data custodians’ there were plenty of news stories this month that highlighted the most pressing issues CISOs are facing.

Read More
Karen Mesoznik Karen Mesoznik

What is Cyber Security Mesh Architecture (CSMA)?

What is Cybersecurity Mesh Architecture (CSMA)? In this blog, we explore the key tenets of this new architecture and how it allows security solutions to communicate with one another rather than operating in isolation.

Read More
Karen Mesoznik Karen Mesoznik

Webinar Recap: CISO Accountability in the Era of New Industry Regulations

We were honored to have Rinki Sethi, VP & CISO of BILL and Onyxia Advisor, join our very own CEO and Founder, Sivan Tehila, to speak about CISO accountability in light of new regulations, like the SEC cybersecurity disclosure rules. Learn more about the insights shared and access the webinar on demand.

Read More
Karen Mesoznik Karen Mesoznik

Onyxia Cyber Recognized as a Sample Provider in CDPO  in the 2023 Gartner® Emerging Tech: Mitigate Advanced Persistent Threats in SaaS and Cloud Report.

Onyxia Cyber was Recognized as a Sample Vendor in the Cyber Defense Planning and Optimization (CDPO) category in Gartner’s report on Emerging Technologies and Trends. Gartner describes CDPO solutions as ones that can help CISOs “focus on reducing the attack surface without creating gaps in coverage of attacks” and keep their “focus on best-of-breed protection against major attack patterns.”

Read More