Cybersecurity Industry

The Impact of Politics on Cybersecurity: CVE’s and the Chris Krebs Executive Order
What would happen if the US government halted funding for the CVE program? In this episode, we explore the controversies surrounding the funding of the CVE program, the role of CVEs in ...

Euler’s Königsberg Bridges: How Simple Math Can Model Lateral Movement for Effective Microsegmentation
You may have seen the “no-lift pencil” puzzles online — challenges that ask you to draw a shape without lifting your pencil or retracing any lines. I solved a few of these ...
ColorTokens Breaks the Scale with First-Ever Average Score of 5.0 in Key Features in GigaOm Microsegmentation Radar
In cybersecurity, everyone talks about preventing breaches. But at ColorTokens, we’ve taken a different approach. We focus on helping our customers contain, withstand, and recover from breaches with minimal business disruption. That’s ...
See You at RSAC™ Conference on April 29th to May 1st!
Exhibiting at the RSAC conference at the Moscone Center in San Francisco is always exciting; we get to speak with our customers and prospective customers, analysts, and partners. Our team is ready, ...
CISA’s Call to Halt Lateral Movement in Critical Infrastructure
The latest federal advisories emphasize that the largest damage occurs when attackers exploit weaknesses to move laterally through both IT networks and operational technology (OT) environments. Notably, Ghost ransomware, also known as ...
ColorTokens’ Gold Rush at Globee Awards
Call it unstoppable momentum or call it yet another powerful validation of our breach-readiness approach. We’re riding high into RSA 2025 with triple Gold medals, and one Silver medal from the Globee ...

Prompt Injection Attacks in LLMs: Mitigating Risks with Microsegmentation
Prompt injection attacks have emerged as a critical concern in the realm of Large Language Model (LLM) application security. These attacks exploit the way LLMs process and respond to user inputs, posing ...

Zero Trust: The Secret Sauce Behind Breach Readiness
For years, organizations have invested heavily in firewalls, perimeter sensors, and intrusion detection to keep attackers at bay. But as we continue to see each day, adversaries always manage to slip past ...

AlgoSec and ColorTokens: Integrated to Stop Cyberattacks in Every Direction
There are two vectors that hackers use to attack your enterprise. One is characterized as the North-South vector, which describes traffic moving between the enterprise and the public internet (or other outside ...
Recent Ransomware Attacks and the Danger of Lateral Movement
Breaches happen, and often in the worst way possible. Once attackers find a tiny crack, they move laterally, slipping past network boundaries until they can hold your entire operation hostage. If recent ...