Guide to Meeting Cybersecurity Insurance Requirements
Cyber insurance claims are climbing as data breach and ransomware attacks become more…
A Modern Guide to Ransomware Protection
A ransomware attack is everyone’s nightmare. Nothing can cripple an organization…
Pen Test Postmortem: How To Get Owned
Professional good-guy attacker Pedro M. Sosa covers the most common findings from security…
The Return of Emotet Malware
The infamous botnet and malware known as Emotet is making a rise from the ashes in a new,…
Why Scheduled Patch Windows Are Bad Practice
The growing rate of new vulnerabilities and the short time it takes adversaries to weaponize…
The Market Collision of SIEM, EDR, MDR, XDR, and the MSSP
The market for security tools and managed services are approaching a collision point as…
8 Years Until Quantum Computers Break Cryptography
Researchers believe they've targeted the date when a quantum computer will defeat…
What You Need to Know About Shrinking Certificate Lifespans
A threat to modern encryption comes from ever increasing power in brute force hardware and…
Quantifying Cybersecurity Risk and Uncertainty
Adapting a few quantitative analysis methodologies to decision making in cybersecurity…
Open Source Developers Sabotage Projects Downloaded By Millions
What can devOps and cybersecurity professionals learn from the latest software supply chain…
The Five Biggest Cybersecurity Challenges in 2022
At the outset of the new year we take a look at the biggest challenges ahead.
The Dangerously Opaque World of the Shopify App Store
While Shopify's app-extensible platform is easy to use, it allows plugin developers access…