Shift left, stay ahead: The case for early threat prevention
Cybersecurity strategies today often focus on what happens after an attacker gains entry or how to respond once malicious activity...
Cybersecurity strategies today often focus on what happens after an attacker gains entry or how to respond once malicious activity...
Researchers discover a new way to steal secrets from Android apps.Anything any Android app can display is vulnerable to the Pixnapping...
What do you do when you discover that your cybersecurity is not what you have promised, even though there has...
Microsoft Identity systems sit at the core of nearly every enterprise. Active Directory, Entra ID, Microsoft 365, Intune and Teams...
Oracle over the weekend issued another security alert about a vulnerability in its E-Business Suite (EBS), the software family that...
When it comes to regulating AI, America seems to be, at best, taking a wait-and-see or perhaps a laissez-faire approach....
Nobody thinks they’ll leave the back door wide open until it happens. Sometimes the biggest cybersecurity weaknesses are the ones that hide in plain sight, where...
The modern attacker’s mantra isn’t “break in” – it’s “log in.” Advanced groups, such as Volt Typhoon, demonstrate that identities,...
The Vital Role of Non-Human Identities in Cloud Compliance What makes cloud compliance an intricate challenge for modern enterprises? With...
How Can Efficient Secrets Rotation Empower Your Cybersecurity Team? How can organizations ensure the security of machine identities and secrets...
Lohrmann on Cybersecurity The Cybersecurity and Infrastructure Security Agency is under new leadership and focus as we enter FY2026. So...
How Secure Are Your Non-Human Identities? Have you ever considered how secure your non-human identities are? Safeguarding Non-Human Identities (NHI)...
Are You Harnessing the Full Potential of Non-Human Identities in Your Cloud Security Strategy? Non-human identities (NHIs) are revolutionizing the...
Why Is Independent Verification of Non-Human Identities Crucial for Cybersecurity? When it comes to cybersecurity, how often do organizations think...
Hackers Behind the Code I recently had the privilege of being a guest on the “Hackers Behind the Code” podcast,...