OWASP Top 10 2017 – Ten Most Critical Web Application Security Risks

The Open Web Application Security Project (OWASP) is an online community that provides free articles, methodologies, documentation, tools and technologies in the field of web ...
Read More

Quick Guide: Security as a Service (SECaaS)

What is Security as a Service?
Read More

What Role Does Cybersecurity Play In Your Physical Security?

Today, very few organizations depend solely on one kind of security measure to secure their organization and cover their assets. Most companies employ security systems that ...
Read More

Security Transformation Enables the Threat Landscape to Evolve

As Digital Transformation impacts the evolution of the global economy, how are security interests evolving to keep up? Artificial Intelligence (AI) gives rise to highly ...
Read More

Security Advisory: Major Flaws Found Within AMD Processors

Israel-based CTS-Labs states that more than 13 major flaws are found within AMD’s Ryzen, Ryzen Pro, Ryzen Mobile, and EPYC processors, affecting millions of devices. These ...
Read More

The Must-Have Features for Vulnerability Assessments and Scanners

Vulnerability assessment and scans can both be eye-opening exercises for your security team. But, what are the must-have features for each? In this blog, we explore the most ...
Read More

The difference between vulnerability assessment & penetration testing

Security professionals are usually familiar with vulnerability assessment and penetration testing (pentest). Yet, the terms are often used synonymously which adds a bit of ...
Read More

CIPHER Named Top 100 Security Provider by CRN

Miami, FL, February 20, 2018 – CIPHER Security LLC., a leading global cybersecurity solution provider, announced today that CRN®, a brand of The Channel Company, has named ...
Read More