Blog

Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.

The Register logo

Cheers ransomware hits VMware ESXi systems

Another ransomware strain is targeting VMware ESXi servers, which have been the focus of extortionists and other miscreants in recent months. Read the...
security boulevard logo

DoJ Decision Gives Good Faith Hackers Relief From CFAA

After years of being hamstrung by the threat of prosecution under The Computer Fraud and Abuse Act (CFAA), security researchers and hackers operating...
question marks tiled

The Top 3 Questions to Ask a Threat Modeling Vendor

Purchasing a threat modeling tool can be intimidating. For starters, most people who need threat modeling aren’t threat modeling experts. To compound...
technews word logo

Hackers Cast LinkedIn as Most-Popular Phishing Spot

LinkedIn users are being steadily more targeted by phishing campaigns. In recent weeks network audits revealed that the social media platform for...
commerce times logo

Hackers Cast LinkedIn as Most-Popular Phishing Spot

LinkedIn users are being steadily more targeted by phishing campaigns. In recent weeks network audits revealed that the social media platform for...
SC media logo

2022 SC Awards Finalists: Best Threat Intelligence Technology

Cybercrime is big business, and techniques of bad actors are growing increasingly sophisticated. That leaves security teams thirsting for near...
SC media logo

2022 SC Awards Finalists: Innovator of the Year

Bad actors rapidly evolve their tactics. Security companies, therefore, need to evolve faster. And they need leaders to drive that effort. Read the...
person looking at context tree

Gain Insight Into Your Attack Surface AND Compliance Requirements With Threat Modeling

If you haven’t kept up with the evolution of threat modeling, you probably envision threat modeling as simply a visualization tool or a framework like...
security logo

SolarWinds Data Breach Lawsuit Takeaways for CISOs

A lawsuit alleges SolarWinds did not take adequate actions to prevent a data breach. Security executives offer insights into this complex case Read...