Application Security
07 Feb 2024
Problems arise when teams are too siloed. In the past, organizations ran into trouble when Development teams would hand over finished code with security problems to IT Operations to deploy and manage. They realized it was faster and more effective…
Research & Threat Intel
26 Oct 2023
Earlier this month, the District of Columbia Board of Elections (DCBOE) warned that a threat actor may have gained access to the personal information of their registered voters. This would include personally identifiable information (PII) such as contact details, partial…
Application Security
27 Apr 2023
Vulnerability scanning and penetration testing are vital pieces of the security puzzle, and it's important to understand the difference between the two. Both vulnerability scanning and penetration testing can be used to assess the entire IT infrastructure, but in this…
EASM
17 Nov 2022
In modern cybersecurity, it's not just about what's inside your network—it's about what's exposed to the outside world. With the proliferation of cloud services, third-party integrations, and remote work setups, your organization's external attack surface has grown exponentially. Traditional security…