Blog

Onyxia Cyber and Qualys Join Forces to Transform Vulnerability Management
Karen Mesoznik Karen Mesoznik

Onyxia Cyber and Qualys Join Forces to Transform Vulnerability Management

Onyxia Cyber has launched an official integration partnership with Qualys, bringing even greater power to Preemptive Vulnerability Management. This partnership gives security teams the tools to strengthen vulnerability management, stay ahead of potential risks, and communicate security performance with clarity.

Read More
Top CISO Stories from Around the Web: September
Karen Mesoznik Karen Mesoznik

Top CISO Stories from Around the Web: September

From New York hospitals preparing to meet new mandates requiring a dedicated CISO, federal agencies ramping up AI for cyber defense, and experts weighing in on the Heathrow cyberattack, to CISOs embracing containment-focused strategies, shadow AI emerging as a major governance challenge, September proved to be a month of major, game-changing cybersecurity developments.

Read More
The Top CISO Stories from Around the Web: August
Karen Mesoznik Karen Mesoznik

The Top CISO Stories from Around the Web: August

From increasing personal liability in the CISO role and NIST’s plan to take on AI security, to Federal CISO Mike Duffy’s encouragement of community dialogue at Black Hat USA, and an electronics manufacturer's recent ransomware report to the SEC, August was a month full of impactful and industry-changing cybersecurity news stories.

Read More
Harshal Mehta, CWT Vice President and Chief Information Security Officer, Joins Onyxia Cyber’s CISO Advisory Board
Karen Mesoznik Karen Mesoznik

Harshal Mehta, CWT Vice President and Chief Information Security Officer, Joins Onyxia Cyber’s CISO Advisory Board

We are delighted to announce that Harshal Mehta, Vice President and Chief Information Security Officer (CISO) at CWT, has joined our advisory board as a strategic CISO advisor. Harshal brings over 18 years of global cybersecurity leadership, including senior roles at Fortune 500 companies and extensive consulting experience as an ex-Big 4 leader.

Read More
The Top CISO Stories from Around the Web: July
Karen Mesoznik Karen Mesoznik

The Top CISO Stories from Around the Web: July

In this month’s CISO story roundup, discover why CISOs are burning out under impossible pressure, how AI is shaking up cybersecurity on both sides of the fight, and why the human factor remains the biggest vulnerability, even the strongest defenses can’t ignore it. 

Read More
The Top CISO Stories from Around the Web: June
Karen Mesoznik Karen Mesoznik

The Top CISO Stories from Around the Web: June

From grappling with LLM hype to combating sophisticated cybercriminal groups and managing increased burnout, June’s CISO stories highlight critical industry insights and dig into emerging security trends.

Read More
Top CISO Stories from Around the Web: May
Karen Mesoznik Karen Mesoznik

Top CISO Stories from Around the Web: May

In May, cybersecurity stories made global headlines. Learn more about the recent Coinbase cyber attack and Scattered Spider ransomware attacks, and get a glimpse into how CISOs are leaning into AI tools to reduce cost pressures.

Read More
The Top Stories from Around the Web: April 2025
Karen Mesoznik Karen Mesoznik

The Top Stories from Around the Web: April 2025

This month's roundup covers critical areas such as strengthening cyber-resilience, refining vulnerability management practices, navigating economic volatility, addressing budget shortfalls, and adapting to the rapidly evolving impact of AI on cyber threats and regulations. Each of these topics provides crucial insights for leaders aiming to secure their organizations in an increasingly complex environment.

Read More
The Top Stories from Around the Web: March 2025
Karen Mesoznik Karen Mesoznik

The Top Stories from Around the Web: March 2025

The top CISO stories for March provide valuable insights into emerging trends, industry best practices, and expert perspectives, empowering CISOs to make informed decisions and strengthen their cybersecurity postures.

Read More