Cybersecurity
Fitting Cybersecurity Investments into Your Budget
How Can You Make Cybersecurity Budget Allocations Effective? How do organizations allocate effective funds to cybersecurity? The million-dollar question remains unanswered for many businesses, irrespective of their sizes. It’s not just a ...

Randall Munroe’s XKCD ‘Renormalization’
via the cosmic humor & dry-as-the-desert wit of Randall Munroe, creator of XKCD Permalink ...
The Role of Microsegmentation in Managing Lateral Movement Through Inbound and Outbound Traffic Policies
Microsegmentation has become a foundational component of enterprise security and a Zero Trust Architecture (ZTA). As threats continue to grow in complexity, the ability to contain and limit the spread of an attack ...

Application Security Testing: Security Scanning and Runtime Protection Tools
Learn about the differences between security scanning and runtime protection in application security testing. Explore tools and tech ...
Summer Cyberattacks
Why the Heat Brings a Surge in Credential-Based Threats Summer is synonymous with vacations, long weekends, and out-of-office replies—but it’s also peak season for cybercrime. As security teams scale back and employees ...

An Identity Security Playbook: The What and The Why
Join us later in the month for our next industry webinar where our founder Simon Moffatt will be in conversation with Silverfort EMEA chief advisor Rob Ainscough on the need for an ...

Credential Stuffing: Examples, Detection and Impact
Credential stuffing has become one of the most common and significant threats facing organizations today and is a risk for virtually any application that has login functionality, which is to say most ...
Adapting to New Security Challenges in the Cloud
Understanding the Realm of Non-Human Identities in Cloud Security Is your organization fully prepared to confront the new wave of cloud security challenges? If your answer is uncertain or negative, have you ...
Feeling Relieved with Solid Secrets Management
Feeling Overwhelmed By the Complexity of Cybersecurity? Are you one of the many professionals struggling to stay ahead of increasingly complex and evolving cybersecurity threats? If so, you’re not alone. The task ...