Three Pillars of Infosec: Confidentiality, Integrity and Availability

When in doubt, return to the basics and make sure you are excelling in those areas before following industry trends that may or may not improve your security posture…

CSA survey reveals increasing complexity of cloud environments

Latest cloud security research reveals misconfigurations are leading causes of breaches and outages, as public cloud adoption doubles.

Busted: Taking Down Ransomware Attackers

The attention surrounding ransomware might be unprecedented this year, and law enforcement has brought ransomware actors to justice in the past. Let’s look at a few examples.

The Value Drivers for an XDR Investment

We have a pretty good idea by now of what Extended Detection and Response (XDR) is. As we noted in an earlier article, titled XDR: The Next Step in Threat Detection and Response, XDR is a security approach that builds on the successes of Endpoint Detection and Response (EDR).

Taking Control of Network Security Policy

In this guest blog, Jeff Yager from IT Central Station describes how AlgoSec is perceived by real users and shares how the solution meets their expectations for visibility and monitoring.

New banking paradigm requires better security paradigm

The digital shift is creating security challenges for the FSI. Learn how Synopsys tools and services can help get your security program back on track

Ultimate Ransomware Guide: Types and Definitions of Ransomware Attacks

In this article, we’ll lay out the different types of ransomware and the dangers of each one. You’ll learn how ransomware works and what each various attack is seeking to accomplish.

T-Mobile Data Breach: What Makes This One Different, and What You Can Do Now to Stay Secure

Asian business woman talking on cell phone while working at office. Female executive reading some documents and talking on mobile phone.

Hackers claimed to have obtained data of 100 million T-Mobile customers from its servers, selling some of this data on the underground web for 6 bitcoin, or $280,000, according to WIRED.

How to cyber security: Invisible application security

Invisible application security is the concept of integrating and automating AppSec testing with little interruption to developer workflows.

Why penetration testing needs to be part of your IoT security

Penetration testing is critical to assessing the overall strength of your company’s defense against cyber criminals targeting IoT devices.