Cyolo Receives Investment from IBM Ventures for Zero Trust Secure Access Platform
It’s the most wonderful time of the year — for a scam. Follow the recommendations in this guide to stay cyber-safe while online shopping this holiday season.
A recently announced OpenSSL vulnerability is especially dangerous given how widely OpenSSL is used. Organizations that can't easily patch should consider virtual patching.
This blog examines three OSINT methods attackers use to identify public vulnerabilities and exposed components – plus how to defend against these attacks.
On Nov. 1, 2022, popular file-sharing service Dropbox reported a prior security incident. The attackers used a phishing email to steal employee GitHub credentials.
Many recent breaches, including this week's Uber breach, are the result of compromised credentials. Learn how an identity-based approach to access improves security.
IT is tech for digital information, OT is tech for industrial machine management. Learn more about OT vs. IT, when to use each one and security concerns.
Now is the time for CISOs and other security stakeholders to plan their 2023 cybersecurity budgets. Follow these 5 tips to help optimize your spend.

Subscribe to our Blog

Subscribe to our Blog

Get the latest posts in your email