left-of-bang, threats, vulnerabilities, XDR, zero-trust, attack, XDR API Skyhawk Security modeling threat CosmicStrand insider threats Threat Modeling - Secure Coding - Cybersecurity - Security

Debunking Three Common Threat Modeling Myths

The benefits of threat modeling are significant. Not only does it provide a systematic process for evaluating potential threats to an organization’s system, but it also creates a framework for informed decision-making, ...
Security Boulevard

Dispelling Body Language Myths

Written by Christopher Hadnagy and Dr. Abbie Marono There is no denying the appeal of body-language focused blogs, particularly those […] ...
Popular Myths about VPNs

Popular Myths about VPNs

In this sponsored episode from our friends at ClearVPN, Artem Risukhin Content Marketing Manager at ClearVPN, joins co-host Tom Eston to discuss the most popular myths about VPNs. Be sure to watch ...

Debunking Top Cloud Misconfiguration Myths

Do you remember all the apprehension about cloud migration in the early days of cloud computing? Some of the concerns ran the full paranoia gamut from unreliability to massive overcharging for cloud ...
WhatsApp Limits Message Forwarding to Prevent Spread of Misinformation

WhatsApp Limits Message Forwarding to Prevent Spread of Misinformation

Facebook announced an interesting new limitation to WhatsApp with the clear goal of curbing the spread of false information related to COVID-19. While it’s difficult to dispute the benefits of having a ...
A Shortage in Common Sense: The Myth of the Talent Gap

A Shortage in Common Sense: The Myth of the Talent Gap

I have a visceral reaction every time I encounter yet another article bemoaning the so-called "talent gap" or "labor gap" in cybersecurity. Having been in and out of the job market several ...

Secure Guardrails