Mackenzie Jacobson

Mackenzie Jacobson
Mackenzie is the Senior Manager of Digital Marketing at Threat X. She is a detail-oriented marketing professional with experience in B2B strategic marketing development, implementation, and analysis. Through highly-targeted, demand generation campaigns, Mackenzie is committed to bridging the gap between interested prospects and solutions providers, and does so through web, SEO/SEM, email, social, and display advertising campaigns. She has held prior roles managing global demand generation campaigns at a digital marketing agency, tech startups and Fortune 500 company.
Find me on:

Recent Posts

5 Negative Impacts of Misaligned Security Strategies

Posted by Mackenzie Jacobson on Aug 2, 2018 10:07:46 AM

It's no secret that the frequency and intensity of data breaches is growing at an exponential rate. Based on data from Verizon's Data Breach Investigations Report, there were nearly 53,000 incidents and over 2,215 confirmed breaches in a mere 12 months. This confirms the fear that many organizations face that hackers are thriving in an expanded playing field, and organizations don't have the resources or the bandwidth to keep up. 

In response to this and similar trends, businesses are commonly resorting to impulse investments in technology and resources that promise stronger defenses. Unfortunately, these rash decisions often cause security strategy misalignment - the results of which often mirror the likes of data breaches in their negative impact on the business.

Read More

Topics: Web, Application & Hybrid Cloud Security

Meet ThreatX at Black Hat 2018

Posted by Mackenzie Jacobson on Jul 25, 2018 11:50:16 AM

On August 8 and 9 in Las Vegas, thousands of cybersecurity enthusiasts, practitioners and executives will be in attendance at Black Hat 2018. We are thrilled to be among the participants at this year's event.

Read More

Topics: Company | News

The Proliferation of Web Application Attacks - "Ain't Nobody Got Time for That!"

Posted by Mackenzie Jacobson on Jul 2, 2018 12:40:22 PM
Today, security teams are challenged to protect the large attack surface created by complex application environments. Mix in APIs and microservices and it has become nearly impossible for security teams to adequately manage the multiple security products required or conduct manual threat analysis. So what's the solution? 
Read More

Topics: Company | Product Updates

Top 7 Frequently Asked Cybersecurity Questions, Answered.

Posted by Mackenzie Jacobson on Jun 13, 2018 11:16:03 AM

We recently co-hosted a webinar with SANS Institute, Your Current Approaches to Threat Detection and Neutralization are Broken. During that webcast, experts from ThreatX and SANS addressed the current challenges inherent in protecting your web applications in today's complex hybrid cloud environments, and the common inefficiencies of some legacy WAF approaches.

This discussion sparked various questions, some of which we receive quite often. In case you missed it, we compiled the answers to the mosts frequently asked questions.

Read More

Topics: Web, Application & Hybrid Cloud Security

The Silver Bullet for Mastering Threat Detection in the Hybrid Cloud

Posted by Mackenzie Jacobson on May 23, 2018 8:35:00 AM

Despite its theoretical conception in the 1960s1, cloud computing has only truly emerged and taken hold in the last decade. Organizations are now striving to find the balance in utilizing both the private and public cloud - what we refer to as the hybrid cloud environment.

While this middle ground has allowed for greater flexibility, it also complicates the desire and need to protect the data housed in these environments. Not to mention the sure volume of data, which grows at an annual compounding rate of 42% (according to the IDC). As a result, it is unrealistic to expect static signature-based security models to remain effective while continuing to offer protection for today's web applications. In this respect, legacy approaches to web application protection are fundamentally broken and often result in:

  • Costly false positives
  • Poor application response times
  • Impeding agile development
  • Overworked security teams
  • Untenable event analysis and maintenance burdens
The compliance box may be checked, but the confidence box surely is not.
Read More

Topics: Web, Application & Hybrid Cloud Security

Threat X Labs - Blog

Arm yourself with information and insights on the latest cybersecurity trends to defend against today's most advanced cyber criminals with articles from the leader in SaaS-based web application firewall solutions.

Subscribe Here!

Recent Posts

Follow Me