Our Blog

Stay updated with all the latest news and announcements

pic131

Cybersecurity Trends

The Secret Service's Cyber Capabilities

While best known for their bodyguards and snipers, the U.S. Secret Service has accumulated an impressive suite of advanced cyber capabilities.

read more



pic130

Cybersecurity Trends

Top Five Malware Strains in 2024

Hackers are leveraging AI to develop new malware strains at an alarming rate. Researchers estimate that over 1,500 new variants are introduced daily.

read more



pic129

Cybersecurity News

Top 5 Mistakes When Pursuing Cybersecurity Compliance

At a time when cyber threats loom large, achieving cybersecurity compliance with standards like ISO 27001 or SOC 2 is not just a regulatory requirement but a ...

read more



pic128

Cybersecurity News

GISEC Global 2024 Recap

The latest round of GISEC Global took place in Dubai last week, bringing together thousands of industry experts, vendors and customers over three days.

read more



pic127

Cybersecurity News

Evaluating the Biden Administration's Cybersecurity Impact

With elections fast approaching, it's important to review the current administration's performance regarding their cybersecurity goals and campaign promises.

read more



pic126

And How They Could've Been Avoided

The Largest Cyber Breaches of 2023

As technology continues to advance, so do the tactics of cybercriminals seeking to exploit vulnerabilities for their gain.

read more



pic125

Cybersecurity Trends

Top 10 Challenges Facing CISOs in 2024

2023 has been a year of dichotomies. On the one hand, we've seen hypergrowth in security awareness and investment. However, at the same time, ransomware risks...

read more



pic124

Here's what they said

What keeps CISOs up at night?

We asked 100 cybersecurity professionals what was the number one threat that keeps them up at night. Here's what they said.

read more



pic123

Cybersecurity Trends

What's the difference between EASM and DRPS?

In the ever-evolving landscape of cybersecurity, staying ahead of potential threats requires a nuanced understanding of various protective technologies.

read more



pic122

Here's what they said

Should CISOs be personally liable for corporate breaches?

We asked 100 cybersecurity professionals whether CISOs should be personally liable for corporate security policy and data breaches.

read more



pic121

Cybersecurity Trends

Is it Safe to Deploy your own LLM?

The rapid introduction of LLMs has created one of the largest technological leaps in a generation.

read more



pic119

A Practical Guide

Choosing the Right Penetration Test for Your Company

With data breaches filling the headlines on a daily basis, businesses in every industry are rushing to proactively assess their vulnerabilities and fortify th...

read more



pic118

Cybersecurity News

3 Major Changes in NIST's First-Ever Update to the CSF

Since its release in 2014, NIST's CSF quickly rose to become the number one cybersecurity framework in the world.

read more



pic117

Here's a look inside.

10 Most Exploited Vulnerabilities of 2022, according to CISA

Each year, the US Cybersecurity & Infrastructure Security Agency publishes a list of the world's most widely exploited vulnerabilities.

read more



pic116

Cybersecurity Trends

Transforming Cybersecurity with Predictive Breach Detection

A major advancement driving a paradigm shift in cybersecurity is the concept of predictive breach detection.

read more



pic115

Cybersecurity Trends

Top Takeaways from Infosecurity Europe 2023

The latest round of Infosecurity EU took place in London a few weeks ago, bringing together thousands of industry experts, vendors and customers over three days.

read more



pic114

Cybersecurity Trends

The Latest Advances in Incident Detection and Response

Cybersecurity incidents are becoming more common and sophisticated, and it is essential to be prepared to respond to them promptly and effectively.

read more



pic113

Cybersecurity Trends

An Introduction to Next-Gen Penetration Testing

The penetration test, or as it is fondly nicknamed, the pentest, has been a security staple for decades. But is it time for an upgrade?

read more



Load More