Cyolo Receives Investment from IBM Ventures for Zero Trust Secure Access Platform
This is the first blog in a two-part series reviewing the top insights from the recent SANS report, “The State of ICS/OT Cybersecurity in 2022 and Beyond.”
It’s the most wonderful time of the year — for a scam. Follow the recommendations in this guide to stay cyber-safe while online shopping this holiday season.
A recently announced OpenSSL vulnerability is especially dangerous given how widely OpenSSL is used. Organizations that can't easily patch should consider virtual patching.
This blog examines three OSINT methods attackers use to identify public vulnerabilities and exposed components – plus how to defend against these attacks.
Device posture is an often overlooked factor that can help verify a user's digital identity. Learn how effective identity-based access solutions use device posture.
On Nov. 1, 2022, popular file-sharing service Dropbox reported a prior security incident. The attackers used a phishing email to steal employee GitHub credentials.
Security audits may feel daunting, but they provide the perfect opportunity to take stock of your environment and discover what is needed to improve your security posture.

Subscribe to our Blog

Subscribe to our Blog

Get the latest posts in your email