Product Spotlight Product spotlight on risk and threat monitoring Taelor Daugherty June 11, 2024 Security magazine highlights a few products that help keep critical systems safe from attack.Read More
83% of organizations faced at least one account takeover the past year Security Staff June 5, 2024 A new survey reveals that account takeovers are a prominent threat. Read More
Misconfigurations drive 80% of security exposures Security Staff May 6, 2024 An analysis of more than 40 million exposures provides a view the current exposure landscape, revealing 80% are driven by misconfigurations. Read More
Hybrid-cloud: The best of both worlds Laurent Villeneuve April 19, 2024 No matter how many systems are running on local devices or connected to the cloud, organizations can bring them all back to a central head end. Read More
92% of IT leaders report cyberattacks are more frequent than last year Security Staff March 27, 2024 Cyberattacks are growing in volume and sophistication, and security leaders must adapt to face increasingly complex threats. Read More
67% of businesses sync on-premises passwords to cloud environments Security Staff March 26, 2024 New research provides key insights and classifications regarding the threats that identity security teams face. Read More
Report reveals an increase in cloud account compromise incidents Security Staff March 18, 2024 A new report highlights new and continuing threat trends that security leaders must prepare to face in the coming years. Read More
New research uncovers an emerging malware campaign Security Staff March 7, 2024 Research done by Cado Security has revealed a new malware campaign as well as its most common targets. Read More
Evolving cloud threats were observed in the last half of 2023 Security Staff March 4, 2024 A recent report indicates that malicious actors broadened their techniques and may present more threats to security leaders. Read More
CISA warns that malicious actors are targeting cloud infrastructure Security Staff February 28, 2024 Security experts weigh in on the CISA's advisory, which reveals that cyberattackers are adapting to the increased use of cloud infrastructure.Read More