Cloud ☁️ Security Innovation

Cloud ☁️ Security Innovation

As cloud infrastructure and platform services proliferate in enterprise environments, confidence in the security of the cloud continues to grow, and “cloud-first” strategies are now common even among risk-averse organizations. Still…
Message Mirroring Threat

Message Mirroring Threat

Recent study highlighted more than 80% of all hacking-related breaches happen due to compromised and weak credentials, with three billion username/password combinations stolen.The implementation of two-factor authentication (2FA) has become…

Cybercrime as a service

CaaS is a model where experienced and skilled cybercriminals build and develop sophisticated tools, platforms and capabilities and then sell or rent these to other criminals who do not have…
Microsoft RiskIQ Deal*

Microsoft RiskIQ Deal*

Microsoft Corp. has agreed to acquire digital threat management firm RiskIQ Inc. for $500 million.The deal is expected to be announced as soon as the next few days. Microsoft is…

Cyber Threat Intelligence

With cyber threats becoming increasingly difficult to track and manage, proactive security approach must be taken in order to protect their assets from a breach. This requires ongoing visibility into…