Planning & Responding to Your Next Data Breach

It was the “worst year ever” for data breaches, again. According to data from the Online Trust Alliance (OTA), the number of cyber incidents targeting businesses doubled in ...
Read More

OWASP Top 10 2017 – Ten Most Critical Web Application Security Risks

The Open Web Application Security Project (OWASP) is an online community that provides free articles, methodologies, documentation, tools and technologies in the field of web ...
Read More

Quick Guide: Security as a Service (SECaaS)

What is Security as a Service?
Read More

What Role Does Cybersecurity Play In Your Physical Security?

Today, very few organizations depend solely on one kind of security measure to secure their organization and cover their assets. Most companies employ security systems that ...
Read More

Security Transformation Enables the Threat Landscape to Evolve

As Digital Transformation impacts the evolution of the global economy, how are security interests evolving to keep up? Artificial Intelligence (AI) gives rise to highly ...
Read More

Security Advisory: Major Flaws Found Within AMD Processors

Israel-based CTS-Labs states that more than 13 major flaws are found within AMD’s Ryzen, Ryzen Pro, Ryzen Mobile, and EPYC processors, affecting millions of devices. These ...
Read More

The Must-Have Features for Vulnerability Assessments and Scanners

Vulnerability assessment and scans can both be eye-opening exercises for your security team. But, what are the must-have features for each? In this blog, we explore the most ...
Read More

The difference between vulnerability assessment & penetration testing

Security professionals are usually familiar with vulnerability assessment and penetration testing (pentest). Yet, the terms are often used synonymously which adds a bit of ...
Read More