Traditional vulnerability management approaches can no longer keep up with today’s dynamically changing business needs and attack surfaces that are expanding across clouds, remote workers, IoT, and mobile users. Ad hoc measures, emergency patches, and even...
Stop HelloKitty and PrintNightmare with RidgeBot
In the cyberworld, HelloKitty is not a cute kitten. And PrintNightmare is an actual nightmare....
Recently discovered Zimbra vulnerabilities may have compromised 200,000 companies
Zimbra, an open-source collaborative office suite, consisting of webmail, web document creation...
Supply Chain Attacks: Potential for Profit Multipliers
On July 2nd, what’s considered the biggest ransomware incident to date paralyzed Kaseya and up to...
Recovery from Ransomware – Jack’s Story Part II
Last week, we introduced to you Jack -- an experienced IT veteran -- and began the story of how,...
Ransomware is By Your Side Just like COVID
This is a true story. April 26, 2021: just a regular Monday morning during the year of a global...
Understanding the Challenges, Risks and Best Practices for Securing APIs
Overview Most of today’s digital experiences are powered by APIs, however security remains a...