Security Strategies to Truly Evolve with The Business
Author: Mark Guntrip, Senior Director, Cybersecurity Strategy, Menlo Security
It wasn’t until recently that the C-suite could have long discussions surrounding technology solutions and strategies...
Are APIs Overexposed and Under Protected?
Author: Shreyans Mehta, Co-Founder & CTO, at Cequence Security
Application Programming Interfaces (APIs) are the building blocks upon which many of the digital products and services...
The Genesis Market: Your Users’ Credentials Are Being Bought and Sold—What...
By Matthew Gracey-McMinn, Head of Threat Research at Netacea
"Combo lists" of usernames and passwords leaked in data breaches are widely available on the darknet...
The Growing Cost of Cybercrime: Why Organizations should Invest in Cybersecurity
By Ekaterina Khrustaleva, Chief Operating Officer at ImmuniWeb
2021 was a very stressful year for enterprises and government organizations alike due to an increase in...
Automated Red Teaming: The Pros and Cons
Phil Robinson, Principal Security Consultant and Founder of Prism Infosec
Much has been made over the potential benefits of Continuous Automated Red Teaming (CART) over...
AI Driving the Security Agenda
Author: Tim Wallen, Regional Director, UK&I, LogPoint
It's no secret that organizations are struggling to keep up with the ever-changing methods of cybercriminals and the...
SEO Poisoning: How attackers are exploiting the uptick in browser usage
Brett Raybould, EMEA Solutions Architect, Menlo Security.
Search engine optimization, or SEO as it may be better known, is a key pillar of modern marketing.
As...
Transitioning from MSP to MSSP – is Now the Right Time?
Cyber-attacks today are a daily occurrence. While high-profile attacks that cripple victims’ IT systems and prevent access to critical services make headlines, the threat...
Beyond Identity Access Management: The Next Steps in Post-Perimeter Defense
The last few years have seen an increased acceptance that traditional perimeter-based defenses such as firewalls are not enough, and that attention needs to...
End-To-End and CEO Down: Why Organizations Need a “Whole Of Company”...
Author: Rick Jones, CEO, DigitalXRAID
The White House recently described the approach needed to tackle security threats to businesses and critical infrastructure as a “whole...