We all know the COVID-19 pandemic forced organizations to rapidly accelerate their adoption of collaboration solutions. For organizations already using…
Some years ago, during the renaissance of security information and event management (SIEM), security became log crazy. The hope was…
During the past year, there has been heightened awareness of the risks posed by industrial control system (ICS) vulnerabilities, with…
Ransomware is a big business today and getting bigger all the time. It is so profitable that organized crime and…
Researchers have new discovered a new Common Vulnerability & Exposure (CVE) called Zerologon. According to, Microsoft’s Security Update Aug. 11:…
At first, it may seem antithetical to consider deploying a vendor access management system in the cloud. After all, you…
Risk management has never been more important, especially at a time when data breaches continue to increase. There are numerous…
The proliferation of IoT devices, particularly in the workplace, has left businesses with a new set of security challenges to…
As organizations increasingly utilize DevOps for software development and IT operations, DevOps environments have become a priority target for would-be…
Even when times are good, security analysts working in Security Operations Centers (SOCs) are up against it. They must stay…