Cyber Security Articles & News

The Top Five Names In Cybersecurity

Looking for the top names in cybersecurity? Look no further than the Cybersecurity 500 list of the world’s hottest and most innovative cybersecurity companies:

The Q4 2016 edition was just published by Cybersecurity Ventures. Going down the list, we take a look at the top five names from a branding and marketing perspective. 

Criteria for the top five:

  • The name is easy to say, easy to type, and easy to tell others
  • The name is memorable
  • The name is short, and relevant to what the company does (in this case, cybersecurity)
  • The name doubles as a domain name, with a dot com (.com) at the end

Check out name #3, which made us pretty happy:

One of the cybersecurity controls to put in place is new-school security awareness training, which combines on-demand web based training with simulated phishing attacks to keep users on their toes with security top of mind. Find out how affordable this is for your organization and be pleasantly surprised.

Source: KnowBe4

Topics: Cybersecurity 500, cybersecurity expert, Cybersecurity Ventures, keynote speaker, number three, security awareness training, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

What's Included in a Penetration Test Report?

Penetration tests are an extremely useful exercise to mitigate risks and patch your security gaps. If you’ve been asking yourself why do penetration t..

Read more ›

What Is Pivoting in Cyber Security and What Does It Mean for Pentesters?

Data breaches in 2022 were abundant and sophisticated. Realistically, it’s expected that this year we will continue to see threat actors test their li..

Read more ›

What Is One-time Password (OTP) Social Engineering?

Even if your business has a mature cybersecurity program, there may be one vulnerability that threat actors can still use to steal your company data: ..

Read more ›