Fighting Supply Chain Threats Is Complicated
Relying on the kindness of strangers is not an ideal strategy for CISOs and CIOs. And yet that is the...
Relying on the kindness of strangers is not an ideal strategy for CISOs and CIOs. And yet that is the...
Threat Summary On November 17, 2021, The US Cybersecurity & Infrastructure Security Agency (CISA) pushed an Alert entitled “Iranian Government-Sponsored...
Threat Summary This month it was disclosed that a Microsoft vulnerability that allows for local privilege elevation, previously patched in...
Co-authored by: P, Sriram, and Deepak Setty ‘Tis the season for scams. Well, honestly, it’s always scam season somewhere. In...
With the holidays on the horizon, spirits are high—and it’s those same high spirits that hackers want to exploit. ‘Tis the...
We’ve all fallen for clickbait. Sometimes it’s a juicy headline designed to spark curiosity and drive traffic to a specific website. Other...
If you find that your email has been hacked, one of your immediate reactions is wondering what you should next. The answer: take a...
With the acceleration of cloud migration initiatives—partly arising the need to support a remote workforce during the pandemic and beyond—enterprises...
Cloud Security Gateways (CSGs) are one of the hottest and most sought-after technologies in the market today, driven by the adoption of...
The time to repurpose vulnerabilities into working exploits will be measured in hours and there’s nothing you can do about...