You’ve Got Privileged Access Management… But Can You Keep Secrets Secure?
Threat actors don’t often need to execute the latest zero-day exploit or fight through firewalls to launch their attacks. Instead, they simply walk through the front door with stolen user...
Read Article
Workforce Trends to Watch in 2022: What Attackers Want from Collaboration Apps
In a pandemic-altered business world, one of the most striking developments that’s still unfolding is the global movement of workers rethinking what matters most — in work, life and everywhere in...
Read Article
Breaking Down the Codecov Attack: Finding a Malicious Needle in a Code Haystack
Earlier this month, San Francisco-based technology company Codecov discovered that attackers had compromised its software platform — used by more than 29,000 customers worldwide to test software...
Read Article
Codecov Breach Learning: Engage Developers to Protect the DevOps Pipeline
Regardless of what industry you’re in, software is a driving force behind digital innovation. But what happens when the software your organization builds and uses to innovate isn’t secure? It’s a...
Read Article
It’s Identity Management Day: 16 Stats from the New Cybersecurity Battleground
Today is Identity Management Day – a U.S. awareness initiative presented by the National Cybersecurity Alliance and the Identity Defined Security Alliance (IDSA). In the midst of a dramatic...
Read Article
Hard-Coded Credentials: The Not-So-Secret Secret Putting Your Cloud at Risk
If you’ve never celebrated the Epiphany (or Mardi Gras in Louisiana), you have likely missed out on the tradition of the King Cake. It’s a coffee cake-type pastry with a small figurine baked...
Read Article
Applications Are Everything and Everywhere – Does Whack-a-Mole Security Work?
The SolarWinds digital supply chain attack began by compromising the “heart” of the CI/CD pipeline and successfully changing application code. It highlighted the major challenges organizations...
Read Article
Into The Matrix: Defense Contractor Takes the Red Pill to Accelerate Network Automation
Our modern world is built on vast interconnected systems of network devices. Within an organization, networks keep everyone and everything connected and up and running. To maintain a strong...
Read Article