The Apache Log4j Log4Shell bug is one of the most critical vulnerabilities in the history of cybersecurity.
Hundreds of millions of devices use the Log4j component for various online services, among them government organizations, critical infrast...
Given the insane security environment we are in, it may seem weird to suggest that a tech company is too good at security. How can you be too good at something that is critical to the safety and operational resilience of companies and nations?
Se...
The COVID-19 pandemic has driven a massive increase in e-commerce spending, doubling to an expected $1 trillion this year, according to Adobe.
But that spending surge has brought with it a corresponding rise in payment security challenges. e...
The software supply chain is a critical element in the lifecycle of applications and websites. The interdependencies and components common in modern software development can increase the attack surface and sometimes allow hackers to bypass robust s...
Given the insane security environment we are in, it may seem weird to suggest that a tech company is too good at security. How can you be too good at something that is critical to the safety and operational resilience of companies and nations?
Se...
Endpoint detection and response (EDR) solutions typically deploy in a standard configuration meant to deliver the least number of false positive alerts in a generic environment.
This allows EDR to deploy very quickly, but it also allows for a numb...
In an age of strong data privacy laws like GDPR and CCPA, data loss prevention (DLP) technology is becoming a critically important IT security tool.
Every organization has data, and some of that data is more sensitive than others. Sensitive data c...
Despite all the security measures you might take, a codebase can be the weakest link for any business’s cybersecurity. Sanitizing and validating inputs is usually the first layer of defense. Sanitizing consists of removing any unsafe character from u...