Natural Language Processing (NLP) and All That Comes With It
What is Credential-Stuffing? And How Bad Actors Use it to Attack You
Blockchain Smart Contracts and Supply Chain Security
How Cybercriminals Use Vehicle Identification Numbers (VINs) to Hack Cars
Revelations From CISA Proves Phishing is a Public Menace
{Latest Posts}

Fixing Vulnerabilities at Speed—How Engineering and Security Can Achieve True DevSecOps
What happens when two distinct teams with varied technological expertise, different incentive structures and contrasting priorities converge?—the answer is usually tension. During a recent discussion with colleagues, a completely different result was experienced. ‘Camaraderie’ is

Addressing the Challenges of Securing Hybrid Cloud Access: What You Need to Know
For a growing number of companies, a blend of public cloud services, private clouds, and on-premises infrastructure offer the best solution to the benefits and limitations of each. Cloud adoption is growing, and the past

Single Sign-On: Balancing Power and Responsibility
Single Sign-On (SSO) is a powerful productivity tool for organizations today. Facilitating access to on-premises and cloud-based applications, it dramatically simplifies the user experience. With SSO, users simply logon once, open a web browser or

Why it’s Time to Adopt a Risk-Based Approach to AppSec
Today, AppSec (Application Security) is not only about compliance with regulatory frameworks. In the face of newer threats, a growing attack surface, and the lack of AppSec talent, legacy WAF solutions and traditional security approaches

Digital ID Proofing: Testing…Now Complete
Digital Identity (ID) Proofing—also known as digital identity authentication or digital ID verification using computer technology—is an increasingly important aspect of online security. Even if you’re doing business only online, you still need to be

4 Actions to Improve DDoS Protection
Distributed Denial of Service (DDoS) attacks are increasing in the sheer volume and size of attacks and their impact, severity, and sophistication. Therefore, DDoS attack protection is also becoming more complex and challenging. Simply using

The Importance of Cybersecurity and DDoS Protection in Finance
The financial services sector is one of the biggest industries at risk, particularly after the COVID-19 pandemic and the boosted digitalization of business and personal finances. Banking is no longer a brick-and-mortar business; banking is

How to Build a Cybersecurity Awareness Program from the Ground Up
Amid an ever-evolving cyber threat landscape, CISOs must anticipate the strategies that will be needed to keep their organizations safe. Of critical importance, they need to ensure their colleagues can spot – and report –