
March 30, 2022
This post explains how to use YARA rules differently by targeting only the files that apply to the rules being used to improve scan results.
Blog

March 25, 2022
Palo Alto Networks is expanding the options for organizations that need to secure and manage branch office connectivity and remote workers.
Blog

March 24, 2022
This SXSW panel discusses the role of public and private partnerships in protecting companies and their people in the age of “informationized warfare"....
Blog

March 23, 2022
Netskope’s instance awareness allows customers to reduce risk by filling a void left by traditional secure web gateways and next-gen firewalls.
Blog

March 22, 2022
The Securities and Exchange Commission has published a proposed ruleset that will mandate cybersecurity disclosures by nearly all SEC registrants.
Blog

March 18, 2022
This post identifies common GRC technology implementation pitfalls and offers guidance on improving time-to-value.
Blog

March 08, 2022
The cloud marketplace journey begins by understanding and quantifying the value-at-stake to develop a business case and a phased adoption plan.
Blog

February 28, 2022
The Varonis platform is often underutilized. This post covers how comprehensive, customizable, data-driven and versatile Varonis reporting can be.
Blog

February 24, 2022
The solution to constantly evolving threat actor TTPs is an innovation in mindset that shifts from defensive to offensive thinking.
Blog

February 23, 2022
This advisory from Optiv’s gTIC covers recent incidents related to Russian military operations in Ukraine and provides cybersecurity recommendations.
Blog

February 21, 2022
Netskope’s Jason Clark outlines several key tenets for organizing security service edge (SSE) to keep data safe in the cloud.
Blog

February 18, 2022
This ebook looks at technologies and innovations that will affect cybersecurity in the coming years, including AI, quantum computing and IoT.
Blog