Edgio Strengthens Security Offering With WAAP Enhancements and DDoS Scrubbing Solution
February 28 2023Upgrades boost Edgio's ability to mitigate sophisticated threats and safeguard applications and data.
Read moreEver paid hush money to crooks who broke into your network? Wondered how much you can trust them?
Read moreInfighting, conscription, emigration. The war in Ukraine has pitted cybercriminals against one another like no other event before it.
Read moreBuild a playbook for employees on how to handle suspicious communications, use mail filters, and screen and verify unfamiliar calls to bolster a defensive social engineering security strategy.
Read moreBanning TikTok
February 27 2023Congress is currently debating bills that would ban TikTok in the United States. We are here as technologists to tell you that this is a terrible idea...
Read moreWhen Low-Tech Hacks Cause High-Impact Breaches
February 27 2023Web hosting giant GoDaddy made headlines this month when it disclosed that a multi-year breach allowed intruders to steal company source code, siphon customer and employee login credentials, and...
Read moreEven in Apple's and Google's "walled gardens", there are plenty of 2FA apps that are either dangerously incompetent, or unrepentantly malicious. (Or perhaps both.)
Read moreFriday Squid Blogging: Squid Processing Facility
February 25 2023This video of a modern large squid processing ship is a bit gory, but also interesting. As usual, you can also use this squid post to talk about the security...
Read moreTackling Software Supply Chain Issues With CNAPP
February 25 2023The cloud-native application protection platform market is expanding as security teams look to protect their applications and the software supply chain.
Read more
Recent Comments