Tova Osofsky

Tova Osofsky, Ericom Director of Content Marketing, has extensive experience in marketing strategy, content marketing and product marketing for technology companies in areas including cybersecurity, cloud computing, fintech, compliance solutions and telecom, as well as for consumer product companies. She previously held marketing positions at Clicktale, GreenRoad and Kraft Foods, and served as an independent consultant to tens of technology startups.

Air Gapping Your Way to Cyber Safety featured image

Air Gapping Your Way to Cyber Safety

Physically air gapping enterprise networks from the web is a great way to protect operations, keep data safe … and squelch productivity. Virtual air gapping is a better approach.

Read More
New SEC Cybersecurity Reporting Rules Take Effect featured image

New SEC Cybersecurity Reporting Rules Take Effect

Risk assessment is a key factor in investment decisions. Now, with SEC disclosure rules in effect, investors can more easily take cyber risk into account.

Read More
Cyber risks in education: Safeguarding K-12 institutions featured image

Cyber risks in education: Safeguarding K-12 institutions

K-12 schools must balance the educational and administrative benefits of web use with the potential risks to students and school security associated with internet access.

Read More
Is Disabling Internet Access a Reasonable Cybersecurity Solution? featured image

Is Disabling Internet Access a Reasonable Cybersecurity Solution?

In an ironic case of “Do as I say, not as I do,” Google is cutting off some employees’ web access to reduce the threat of cyberattacks – while touting its security features to users like us.

Read More
Why No SASE/SSE Architecture is Complete Without Isolation featured image

Why No SASE/SSE Architecture is Complete Without Isolation

Web isolation technology strengthens SASE platforms with functionality that extends well beyond secure browsing to protect web app surfaces.

Read More
With AI, Even Amateurs Can Create Sophisticated Malware featured image

With AI, Even Amateurs Can Create Sophisticated Malware

Despite good faith attempts at building in guardrails, generative AI platforms have been successfully coaxed to create undetectable malware.

Read More
Supreme Court Leak Highlights Importance of Cybersecurity Controls featured image

Supreme Court Leak Highlights Importance of Cybersecurity Controls

The investigation into the 2022 leak of a controversial US Supreme Court draft opinion revealed significant gaps in court cybersecurity.

Read More
We Are Not Entertained: Performing Arts are Under Cyberattack featured image

We Are Not Entertained: Performing Arts are Under Cyberattack

Arts organizations’ cybersecurity budgets may be limited but investing in solid cybersecurity is less costly than getting hacked.

Read More
Why Gaming Companies Should Follow the MPA’s Lead featured image

Why Gaming Companies Should Follow the MPA’s Lead

In gaming leaks undermine the buzz companies work so hard to achieve and place sales – both upon release and into the future – at significant risk.

Read More
Fifteen Years of Data Breaches – What’s New and What’s the Same featured image

Fifteen Years of Data Breaches – What’s New and What’s the Same

This year’s DBIR confirms that when it comes to data breaches, users are not their employers’ worst enemies, but they may well be their enemies’ best helpers.

Read More