
September 30, 2020
Hackers can use the username structure and deployed technologies in an online document’s metadata to successfully breach the perimeter.
Blog

September 22, 2020
National Patient Identifier conversations must address the issue of cybersecurity.
Blog

September 17, 2020
Information security strategies often overlook the threats posed by weaknesses in its physical security posture.
Blog

September 16, 2020
Palo Alto Networks Prisma Compute can help minimize the risk of deploying untrusted images.
Blog

September 15, 2020
Making identity the center of both security and experience helps customers feel empowered and protected.
Blog

September 14, 2020
Progressive Risk evaluates how rapid change affects the risk profile, and specifically TPRM.
Blog

September 11, 2020
Moving functionality from Java to native implementations in Android increases obscurity but not security.
Blog

September 02, 2020
Two experienced red teamers describe successful engagements and how to counter attack chains.
Blog

September 01, 2020
This post provides advice on establishing a comprehensive IR plan.
Blog

August 31, 2020
Nearly 70% of security leaders see consolidating vendors as a way to improve security.
Blog

August 25, 2020
A quick walkthrough of the general steps taken to solve an iOS CTF.
Blog

August 18, 2020
Forcepoint’s Romeo Gain outlines how to build an effective data protection action plan.
Blog