Logging into websites or online portals is a daily activity for many. Each time you log in, a session is established, a ...
In our last blog, we discussed how OAuth-based consent phishing attacks have been used to trick users into giving malicious ...
As we kick off 2025, software's role in our daily lives has never been more apparent, and the integrity of our open source ...
The Application Security (AppSec) landscape is changing fast. With recent high-profile breaches and a wave of new Application ...
Beyond the Perimeter: Addressing Blind Spots in Identity Security for 2025. Our founder Simon Moffatt will be in conversation ...
VP, Cybersecurity Services at Cowbell, a leading provider of cyber insurance for small and medium-sized enterprises. Matthieu holds a Ph.D. from Purdue University and is an expert in cybersecurity and ...
If approved, the proposed new HIPAA rules will reshape the landscape of healthcare cybersecurity, partially addressing the recent OIG report’s findings on the ineffectiveness of current HIPAA audits.
Why is Compliance Crucial for Cloud-Native Applications? Cloud-native applications have become a staple in modern business environments. But have you ever pondered the fundamental role compliance ...
Why is Secrets Vaulting Integral to Secure Cloud Environments? Have you thought about just how secure your cloud environment truly is? For professionals spanning across industries from financial ...
Overview: We hope you had a fantastic holiday! Unfortunately, the Grinch might have left one last surprise for us – Tenable has identified a critical issue affecting Nessus Agent versions 10.8.0 and ...
A WordPress plugin known as PhishWP, has been discovered on Russian cybercrime forums and is being exploited by cybercriminals to steal sensitive data from unsuspecting users.
China is continuing to target U.S. entities in its efforts regarding Taiwan, including using state-sponsored Flax Typhoon to compromise Guam infrastructure. U.S. are pushing back, with the Treasury ...