Onyxia Blog

Featured Blog

The Top CISO Stories from around The Web: October 2025

October brought no shortage of chills for CISOs and security leaders across the globe. From a massive telecom threat...

Read more

All Categories

Company News

Product Releases

Partnerships

Current Events

Security Trends

Webinar Recaps

Karen Mesoznik Karen Mesoznik

Onyxia Takes Home Three 2024 Cybersecurity Excellence Awards

Cybersecurity Insiders, one of LinkedIn’s largest information security communities, have awarded Onyxia in three categories for their 9th annual Cybersecurity Excellence Awards. The awards are both in recognition of the impact of our Cybersecurity Management Platform and the leadership of our CEO and founder, Sivan Tehila.

Read More
Karen Mesoznik Karen Mesoznik

Onyxia 2024 RSA Conference Recap

The RSA Conference (RSAC) is a celebration of the cyber community that brings together security professionals from across the world. Here is the recap of the week that was for Team Onyxia and our first time exhibiting at this show.

Read More
Karen Mesoznik Karen Mesoznik

Onyxia Cyber Welcomes Karen Mesoznik as Vice President of Marketing

We are excited to welcome Karen Mesoznik as Vice President of Marketing. A seasoned marketing and media professional with over 15 years of industry experience, Mesoznik will oversee and lead Onyxia’s strategic go-to-market strategy and efforts including brand development; content, field, product, and channel marketing; public and analyst relations, and demand generation activities.

Read More
Karen Mesoznik Karen Mesoznik

The Top CISO Stories From Around the Web: April

From how Google Cloud’s Office of the CISO is shaping the future to a report that only 5% of businesses have a cyber expert, there was a mass of news stories this month related to the plights and success stories that CISOs are experiencing. Here are the top 5 CISO news stories that emerged this April.

Read More
Karen Mesoznik Karen Mesoznik

The Top CISO Stories From Around the Web: March

A cyber attack was committed on Intermountain Health, CEOs and CISOs have more to discuss than ever before, and AI is changing everything. Read on for all of this month’s top CISO stories.

Read More
Karen Mesoznik Karen Mesoznik

The Benefits of Cybersecurity Collaboration: Achieving a Unified and Strategic Approach

The effects and benefits of cybersecurity collaboration are major and far-reaching. The effects, from increased visibility into security posture to even as far as communication at the business level, can help your security program flourish. Some of the added benefits with cybersecurity collaboration include better informed decision-making and streamlined compliance management. Check out our blog post about cybersecurity collaboration to pursue more details!

Read More
Karen Mesoznik Karen Mesoznik

The Top CISO Stories From Around the Web: February

From the CISO’s struggle with their new role that comes with C-suite status to “10 Security Metrics Categories CISOs Should Present to the Board” from a new book for CISOs by CISOs, there were plenty of news stories this month that highlighted the most pressing issues CISOs are facing. Here are the top 5 CISO news stories that emerged this February

Read More
Karen Mesoznik Karen Mesoznik

How CISA Defines Cybersecurity Performance Goals (CPGs)

The release of Cybersecurity Performance Goals (CPGs) by CISA aims to increase organizations' cyber maturity, helping organizations gain confidence in their security and guiding them through the process of reducing business risk. Learn more about how these goals are defined and their impact thus far.

Read More
Karen Mesoznik Karen Mesoznik

The Top CISO Stories From Around the Web: January

The top CISO news stories for January ranged from the CISO’s struggle for C-suite status to a case for why CISOs are ‘data custodians’ there were plenty of news stories this month that highlighted the most pressing issues CISOs are facing.

Read More
Karen Mesoznik Karen Mesoznik

What is Cyber Security Mesh Architecture (CSMA)?

What is Cybersecurity Mesh Architecture (CSMA)? In this blog, we explore the key tenets of this new architecture and how it allows security solutions to communicate with one another rather than operating in isolation.

Read More