Cloud-based API service stores and manages sensitive consumer data with a zero-trust, database-as-a service approach.
Even prior to the COVID-19 pandemic, ransomware attacks were on the rise and becoming more expensive. Now your, um, friend's organization has fallen victim and is going to pay. Here's how ...
A court has ruled that Capital One must allow plaintiffs to review a cybersecurity firm’s forensic report related the bank's 2019 data breach.
This post details how an open source supply chain malware spread through build artifacts. 26 open source projects were backdoored by this malware and were actively serving backdoored code.
This white paper establishes a process that empowers SecOps to improve iteratively over time by leveraging their existing talent and tools.
Phishing ratings, security ratings, human-ness ratings -- we are looking at a future filled with grades of security and trustworthiness. But there is a downside.
A cyber range is an irreplaceable tool that allows cybersecurity professionals to improve their response capabilities as well as their ability to identify risks.
The credential is a commodity and will continue to be breached. As a result, focus and spending must shift toward the access that the credentials provide.