Application Security
13 Mar 2024
Finding savings and efficiencies is part of an IT leader’s role. But sacrificing security for the sake of convenience is almost always asking for trouble later down the line. There are IT security shortcuts that might be well-intentioned and seem…
Application Security
07 Feb 2024
Problems arise when teams are too siloed. In the past, organizations ran into trouble when Development teams would hand over finished code with security problems to IT Operations to deploy and manage. They realized it was faster and more effective…
Research & Threat Intel
26 Oct 2023
Earlier this month, the District of Columbia Board of Elections (DCBOE) warned that a threat actor may have gained access to the personal information of their registered voters. This would include personally identifiable information (PII) such as contact details, partial…
Application Security
27 Apr 2023
Vulnerability scanning and penetration testing are vital pieces of the security puzzle, and it's important to understand the difference between the two. Both vulnerability scanning and penetration testing can be used to assess the entire IT infrastructure, but in this…



