If there’s one thing you can be certain of when you venture out into the wide world of technology...
Security & Compliance Blog
What is Security Threat Modeling?
Due to the rapid advancement of technology, the increased risk of cyber-attacks and system breaches...
An Introduction to Vulnerability Reports
After conducting a vulnerability assessment, conveying the results via a report is critical for...
Security Analytics: An Introduction
Enterprise IT security is driven by data. Network endpoints generate vast volumes of log metrics...
Kerberos Authentication: What It Is & How It Works
Every time users log into a service by providing their credentials, they are potentially exposed to...
A Primer on Endpoint Detection & Response (EDR)
Although computer system security has been around for decades, endpoint detection and response...
The 2020 Gartner Magic Quadrant for Application Security Testing
Published by the leading IT consulting firm Gartner, Magic Quadrants are a series of market...
What Is Security Orchestration, Automation, and Response (SOAR)?
A relatively new platform for data security is Security Orchestration, Automation, and...