The Truth Is Always in the Code: Why Security Starts With Visibility Karen Cohen May 20, 2025 The software security field is ever-changing, but one principle remains constant: the truth is always in the code.Read More
Data Security Risk: Analysis of AI Tools Reveals 84% Breached Security Staff May 16, 2025 84% of AI tools have been breached, suggesting enterprises using these tools (knowingly or unknowingly) may have data at risk. Read More
Recognizing cybersecurity as a revenue growth strategy Reinhard Hochrieser April 16, 2025 Traditionally, cybersecurity has been viewed as a cost center, but forward-thinking enterprises are reframing it as a growth driver.Read More
Recent version of Neptune RAT is spreading, stealing credentials Jordyn Alger April 9, 2025 Research has discovered a recent version of Neptune RAT, which is spreading and stealing credentials. Read More
$20B loss estimated from potential March Madness hacks Jordyn Alger March 18, 2025 With the rise of AI, the potential for monetary losses during March Madness is increased. Read More
Global News Cyberattacks cited as top organizational threat Taelor Sutherland March 12, 2025 Cyberattacks rise throughout 2024.Read More
99% of organizations faced API security issues within past 12 months Security Staff February 26, 2025 API security challenges are ongoing, with 99% reporting API security issues in the past 12 months. Read More
5 Minutes With Understanding the value and practicality of cyber insurance Jordyn Alger February 17, 2025 Security magazine talks with Nick Kathmann, CISO at LogicGate, about the value of cyber insurance for organizations. Read More
A critical challenge: Understanding and addressing insider threats Alan Saquella January 27, 2025 In today’s hyper-connected world, insider threats have become one of the most pressing challenges for organizations. Read More
Top 8 tips for implementing MFA effectively Bassam Al-Khalidi October 28, 2024 MFA is a powerful tool in the cybersecurity arsenal that adds extra layers of security beyond just passwords. Read More