Understanding the 2019 Capital One Attack

Understanding the 2019 Capital One Attack

Learn about how the Capital One attack was carried out, why Web Application Firewalls failed to prevent the attack, and how the attack could have been prevented. The post Understanding the 2019 ...

How a Healthcare Leader Unlocked the Secret to Exceptional Patient Care

Technology is transforming the way healthcare organizations deliver patient care. As people continue to hold their… The post How a Healthcare Leader Unlocked the Secret to Exceptional Patient Care appeared first on ...
90% of Companies Faced Increased Cyberattacks During COVID-19

90% of Companies Faced Increased Cyberattacks During COVID-19

A recent global study by Tanium of 1,000 CXOs reported on the effects of COVID-19 on enterprise and government organizations. 90 percent of those surveyed said they experienced an increase in cyberattacks ...
New Study Says Cyber Security Technology Isn’t as Effective As It Should Be

New Study Says Cyber Security Technology Isn’t as Effective As It Should Be

A new study by Debate Security finds that the efficacy problems in cyber security are more related to economic issues rather than technology issues.  It found that companies when evaluating which cyber ...
The Need for Deterministic Security

Why Do Zero Day Security Technologies Fail to Protect Against Zero Day Attacks?

Today's security technologies fail to detect true zero day attacks, K2 has a video that explains why these security technologies fail to protect against zero day attacks and the need for deterministic ...
More Cyberattacks in the First Half of 2020 Than in All of 2019

More Cyberattacks in the First Half of 2020 Than in All of 2019

A recent study by CrowdStrike showed more cyberattacks in the first six months of this year than in all of 2019 in the network activity of Crowdstrike customers.  It's a trend that's ...
5 Irrefutable Reasons to Prioritize Software Security

5 Irrefutable Reasons to Prioritize Software Security

These days, technology is evolving at a pace like never before seen, forcing organizations into an “adapt or die” situation. And, as digital transformation accelerates, everyone is feeling the effects. DevOps leaders, ...
One Key Cyber Security Fact

One Key Cyber Security Fact

Earlier this year, in March of 2020, CSO Online published an article on the key facts and figures around cyber security for 2020, including the astonishing fact that 60% of attacks were ...
The Limitations of SASE and Zero Trust

The Limitations of SASE and Zero Trust

While SASE and Zero Trust work well for applications where it’s easy to identify valid users, these frameworks fail to address two specific areas of concern. The post The Limitations of SASE ...
Understanding the OWASP Top 10 Web Application Risks

Understanding the OWASP Top 10 Web Application Risks

The OWASP Top 10 Web Application Security Risks has become synonymous with web application security. Learn who OWASP is and where the top 10 list began and the other resources OWASP has ...