Breaking news, news analysis, and expert commentary on cybersecurity threat intelligence, including tools & technologies.
5 Steps to Becoming Secure by Design in the Face of Evolving Cyber Threats
From adopting zero-trust security models to dynamic environments to operating under an "assumed breach" mentality, here are ways IT departments can reduce vulnerabilities as they move deliberately to become more secure.
August 02, 2022
The Great BizApp Hack: Cyber-Risks in Your Everyday Business Applications
IT admins can lock some of the obvious open doors in business applications, but system visibility is key. Build automatic monitoring defenses and adopt a Git-like tool so you can "version" your business apps to restore prior states.
July 27, 2022