Cyber Threat Landscape Study 2023: Outpost24’s honeypot findings from...
Research & Threat Intel
What are the most common cybersecurity threats facing your business? The 2023 Cyber Threat Landscape Study provides valuable threat intelligence...
A pen tester’s guide to Content Security Policy
Application Security
In this article, we’ll look at Content Security Policy (CSP) through the eyes of a penetration tester. We will outline...
Cybersecurity predictions for 2023
Cybersecurity News
In light of the numerous large-scale cyberattacks witnessed in the last year, 2023 promises to be an exciting time for...
ISO 27002 puts threat intelligence center stage
Compliance & Regulations
The updated ISO 27002 adds 11 new controls spanning a range of security services, including the addition of threat intelligence...
Network Graph
8 reasons to implement External Attack Surface Management (EASM)
EASM
In modern cybersecurity, it’s not just about what’s inside your network—it’s about what’s exposed to the outside world. With the...