Driven by digital transformation, organisations are rapidly adopting API gateways. Over 90% are using or evaluating an API gateway and…
Browsing: Malware and Vulnerabilities
CISA Director Jen Easterly announced a new Binding Operational Directive (BOD 23-01) on Monday requiring all Federal civilian agencies to…
As more and more businesses move their operations online due to digital transformation, the need for securing becomes more pressing.…
Threat detection is harder today than it was two years ago. Next year will be harder than this year. Why?…
New findings from Venafi show 81% of companies have had a Cloud Security Incident in the last year. Key findings:…
Lumen’s Black Lotus Labs blogs about discovering a new rapidly growing, multipurpose malware written in the Go programming language. Dubbed…
One of the founding fathers of the United States, Benjamin Franklin, once famously advised that an ounce of prevention is…
iStorage calls for mass adoption of encryption to help stem the rise of cyber crime and limit the impact of…
Using a VPN is essential to access a network securely. This article explains VPNs, what VPNs do, and why you…
A buyer dilemma is happening now with security solutions as business owners and CISOs realize that legacy rules-based WAF is…