Cyber

CSRF attacks work by sending an HTTP request from an authenticated user's browser to the application, which then commits an action without the authorization of the user.
This blog review 5 high-profile ransomware cyber attacks from 2021: Kia Motors, Acer, JBS, CNA and Colonial Pipeline. Each one could have been prevented with zero trust.
The Log4j zero day vulnerability has taken the world by storm and is the most critical and high profile vulnerability. Here's how you can protect yourself.
This post outlines four key requirements that security systems should possess if they intend to decrease IT costs and headaches.
IT is tech for digital information, OT is tech for industrial machine management. Learn more about OT vs. IT, when to use each one and security concerns.
The separation between IT and security teams is outdated, artificial, and can cause substantial harm to your business. Break down the IT-security barriers.
4 dangerous cyber attacks from Q1 2021: Colonial Pipeline, American Family Insurance, a Japanese and a clinic in Edinburgh. They could have been prevented with zero trust. Here’s how.

Subscribe to our Blog

Subscribe to our Blog

Get the latest posts in your email