Application Security
13 Mar 2024
Finding savings and efficiencies is part of an IT leader’s role. But sacrificing security for the sake of convenience is almost always asking for trouble later down the line. There are IT security shortcuts that might be well-intentioned and seem…
Application Security
07 Feb 2024
Problems arise when teams are too siloed. In the past, organizations ran into trouble when Development teams would hand over finished code with security problems to IT Operations to deploy and manage. They realized it was faster and more effective…
Research & Threat Intel
26 Oct 2023
Earlier this month, the District of Columbia Board of Elections (DCBOE) warned that a threat actor may have gained access to the personal information of their registered voters. This would include personally identifiable information (PII) such as contact details, partial…
EASM
17 Nov 2022
In modern cybersecurity, it's not just about what's inside your network—it's about what's exposed to the outside world. With the proliferation of cloud services, third-party integrations, and remote work setups, your organization's external attack surface has grown exponentially. Traditional security…