For years, it’s been an inconvenient truth within the cybersecurity industry that the network security devices sold to protect customers from spies […]
Introduction In our previous blog post titled “Applying Cybersecurity Wisdom to Non-Deterministic GenAI: A Customer Perspective” we discussed how learnings from the […]
SecurityScorecard and KPMG released a report revealing that two-thirds (67%) of third-party energy sector breaches were caused by software and IT vendors. […]
After reports of an unauthorized, malicious actor gaining access to Cisco’s data and customer data, Cisco investigated the allegation and determined the […]
A report by Secureworks revealed a 30% year-over-year rise in active ransomware groups, which demonstrates fragmentation of an established criminal ecosystem. 31 […]
Application programming interfaces (APIs) are growing in prominence. As APIs increase beyond the range of manual control, organizations may face greater security […]