The Other Lesson from the XZ Utils Supply-Chain Attack
“The best supply chain attack execution ever seen” might sound like yet another hyperbole designed to attract attention, except in the case of the recent XZ Utils case, it was…
Artificial Intelligence in 2024
Major Cyber Threats Powered by AI Many have embraced artificial intelligence as a new paradigm, with some even going so far as to call it the “revolution of work.” Unfortunately,…
Unlocking the Power of Behavioral Cloud Native Threat Detection and Response
Behavioral detection and response is not a new concept, and the top three detection and response players command a combined market capitalization of $100 billion. But the rise of cloud…
Sheltering from the Cyberattack Storm
As we move towards the summer and the promise of sunnier weather, it’s worth noting that the cybersecurity industry has seen more rain than sunshine recently. A slew of high-profile…
Changing the Passive to Active: Updating SaaS Cybersecurity Strategy with Threat Management
The massive Snowflake breach disclosed recently, involving hundreds of millions of stolen customer records, is a stark wake-up call for organizations to proactively manage their SaaS security. No doubt the…
Deep Dive: Unveiling the Untold Challenges of Single Sign-On (SSO) Management
Single Sign-On (SSO) serves as the linchpin connecting corporate networks, facilitating seamless access to various web applications without the need for repeated login credentials. However, there are several untold challenges…
How the Newest Tech Changes Cybersecurity Needs in the Legal Industry
Responsibly Adopting Technology to Improve Law Firm Productivity Lawyers face incredible pressure in their jobs to perform accurately and quickly. Thankfully, technology has been introduced that now allows legal professionals…
The First 10 Days of a vCISOs Journey with a New Client
“In a quaint village nestled between rolling hills and dense forests, a young apprentice named Eli was learning to throw pottery from a master potter. On the first day by…
How to Hunt for Volt Typhoon Malware in Critical Infrastructure
🚨🔍 Don’t miss out on the Hunt for Volt Typhoon event! 🌐💻 Join us to explore cutting-edge cyber tactics, innovative defense strategies, and the latest in threat detection. Perfect for…
Strengthening Cyber Defense with Threat Intelligence Operations
By Toby Bussa, VP of Product Marketing, ThreatConnect Introduction In an era where cyber threats loom larger and are more complex than ever, it is vitally important for organizations to…
What Palo Alto Networks and CrowdStrike Teach us About Using a Mobile Defense Platform
By Tom Tovar, Co-creator and CEO of Appdome There’s a major battle brewing between platform vs. platformization companies in cybersecurity. On either side, cybersecurity heavyweights are racing to offer fully…
Celebrating our 12th Anniversary at RSA conference 2024
It’s been an amazing journey and we are so thankful to the team at the RSA Conference for working with us for over a decade. I remember before we went…