Blog
Blog

April 15, 2021
Security is often threatened by rapid transformation. This analysis offers advice to businesses migrating their operations and data to the cloud.
Blog

April 13, 2021
HR 8215 would establish a federal ID system. This program can be beneficial, but we need to understand its scope, complexities and nuances.
Blog

April 12, 2021
We reduced mean time to remediate by accelerating the processes from vulnerability discovery to the deployment of a corrective system update.
Blog

April 08, 2021
Authentication factors like biometrics, WebAuthn/FIDO2.0 and mobile apps with push notifications provide the best security defense.
Blog

April 06, 2021
Getting approval for cybersecurity priorities is tougher than ever. Here’s some advice on talking to the board about the new IT security realities.
Blog

March 31, 2021
This post provides analysis and insight into building an effective policy structure for your organization.
Blog

March 24, 2021
Firefox’s appsec add-ons make it a useful tool for new pen testers who can’t afford professional tools.
Blog

March 22, 2021
MobileIron MDM exposes account enumeration and SFA to unauthenticated attacks. This analysis details how to mitigate this vulnerability.
Blog

March 18, 2021
Given Office product functionality, it’s possible for adversaries to leverage Outlook's COM interface in attacks for extended persistence.
Blog

March 16, 2021
Recent cloud access security brokers and secure web gateways reports suggest we’re rapidly moving toward a secure access service edge future.
Blog

March 10, 2021
Take these immediate steps to protect your data against the recent Microsoft Exchange Server hack.
Blog

February 26, 2021
Sri Sundaralingam of ExtraHop identifies some common supply chain hack elements and explains how to discover and stop them in the early stages.
Blog