This security advisory was published in July 2021 following reports that a number of managed…
The Colonial Pipeline and Oldsmar incidents have highlighted the challenge of securing older operational technology…
In this five-minute read, we make the case for security to not only participate but…
The continued expansion and use of cryptocurrency has always experienced growing pains, as recent events…
It’s clear from the Axie Infinity Ronin Network breach of 2020, the hack of the…
Recent headline-making shopping bots may have CISOs asking “Is our business at risk of a…
In this blog on Managed Detection and Response, Francisco Donoso, vice president of global product…
Hyperconnectivity of OT, ICS and SCADA environments has created an overlap between IT and OT…
The security industry faced a variety of challenges during these last few years. The pandemic…
In this article, originally published in Cyber Security Magazine, we explain the growing importance of…
Users have taken to Microsoft Office 365’s tools, but many are unaware of free features…
We sat down with Dan Woods, VP of the Shape Intelligence Center, which is now…
Recent high-profile ransomware attacks on hospitals have once again demonstrated the vital importance of securing…
In this article: What is NIST CSF? Why use NIST CSF? Incorporating NIST CSF into…