Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Cheers ransomware hits VMware ESXi systems
Another ransomware strain is targeting VMware ESXi servers, which have been the focus of extortionists and other miscreants in recent months. Read the...
DoJ Decision Gives Good Faith Hackers Relief From CFAA
After years of being hamstrung by the threat of prosecution under The Computer Fraud and Abuse Act (CFAA), security researchers and hackers operating...
The Top 3 Questions to Ask a Threat Modeling Vendor
Purchasing a threat modeling tool can be intimidating. For starters, most people who need threat modeling aren’t threat modeling experts. To compound...
Hackers Cast LinkedIn as Most-Popular Phishing Spot
LinkedIn users are being steadily more targeted by phishing campaigns. In recent weeks network audits revealed that the social media platform for...
Hackers Cast LinkedIn as Most-Popular Phishing Spot
LinkedIn users are being steadily more targeted by phishing campaigns. In recent weeks network audits revealed that the social media platform for...
2022 SC Awards Finalists: Best Threat Intelligence Technology
Cybercrime is big business, and techniques of bad actors are growing increasingly sophisticated. That leaves security teams thirsting for near...
2022 SC Awards Finalists: Innovator of the Year
Bad actors rapidly evolve their tactics. Security companies, therefore, need to evolve faster. And they need leaders to drive that effort. Read the...
Gain Insight Into Your Attack Surface AND Compliance Requirements With Threat Modeling
If you haven’t kept up with the evolution of threat modeling, you probably envision threat modeling as simply a visualization tool or a framework like...
SolarWinds Data Breach Lawsuit Takeaways for CISOs
A lawsuit alleges SolarWinds did not take adequate actions to prevent a data breach. Security executives offer insights into this complex case Read...