Nov 16, 2023Focusing on Runtime Vulnerabilities in Today’s Software LandscapeThis guest blog was contributed by Aviv Mussinger, CEO & co-founder of Kodem. Lately, application security and development teams are...
Nov 2, 2023The Importance of Proactive Business Continuity Planning to Minimize Loss Amid Natural Disasters This guest blog was contributed by Mitchell Perry, VP Compliance and Security at Access Amid increasing rates of wildfires, hurricanes,...
Oct 30, 2023The Modern SOC: A Cautionary Tale of Good IntentionsThis guest post was contributed by Joe Schreiber, Co-Founder and Chief Executive Officer, appNovi "The road to hell is paved with good...
Oct 24, 2023Five Methods to Stop QR Code Phishing AttacksThis guest post was contributed by Allen Lieberman, Chief Product Officer, Tessian. From banking enrollments to package deliveries, QR...
Oct 18, 2023From Trust to Zero Trust: The Role of Identity Analytics and ITDRThis guest post was contributed by Craig Cooper, COO at Gurucul In 2023, the average cost of a data breach rose to $4.45 million, after...