Attackers don’t just utilize old, unpatched vulnerabilities, they also exploit recent disclosures at impressive rates. This year we witnessed two worldwide events […]
As organizations transition to the cloud, many are adopting microservice architecture to implement business applications as a collection of loosely coupled services, […]
Understanding the potential threats that your organization faces is an essential part of risk management in modern times. It involves forecasting and […]
It’s been two years since international interference sabotaged the United States’ election security, and still the vulnerability of our voting infrastructure remains […]
Cybersecurity is often an afterthought. Executives are quick to focus on the endgame benefits of customer-centric strategies, digital transformation, mobility, IoT and […]
Rate limiting is a commonly-used tool to defend against application-layer (L7) DDoS attacks. However, the shortcomings of this approach raises the question […]