• December 22, 2022

    Application Programming Interfaces (APIs) have become ubiquitous in IT. There are now more than 400 billion API calls per month. They enable applications to interact and systems to connect with external services.   Think about the many layers of the networking...

  • December 20, 2022

    Security is always in principle a conversation of trust. Do you trust the vendors providing your company with products and services? This is a question which every company should be continually evaluating and reevaluating as part of their ongoing security...

  • December 15, 2022

    It has become increasingly apparent in recent years that more cybersecurity professionals are needed urgently. But the pace at which new people are trained is tortoise-like in comparison to the hare-like pace of cybercrime. And unlike the popular children’s story,...

  • December 13, 2022

    The FBI’s 2021 Internet Crime Report named business email compromise (BEC) as the most effective weapon in the cybercrime arsenal. It accounted for third of the country’s $6.9 billion in cyber losses that year and is expected to rake in...

  • December 8, 2022

    The OpenSSL vulnerability is big news. Why? This one is the OpenSSL bug with the highest level of risk since the infamous Heartbleed way back in 2014. It has since resulted in the release of two common vulnerabilities and exposures...

  • December 6, 2022

    The insurance industry is in somewhat of a crisis. Home insurance rates have climbed. Providers are pulling out of the market in some parts of the country. Flood insurance, too, is a major issue. It is mandated in many coastal...

  • December 1, 2022

    The Zero Trust concept is all about securing endpoints, applications, IT infrastructure and data based on the assumption that any network or endpoint is always at risk of either internal or internal attack. Accordingly, Zero Trust means individuals are not automatically...

  • November 29, 2022

    Q and A with Graham Brooks, Senior Security Solutions Architect, Syxsense.   What is vulnerability management?   Vulnerability management is the process of mitigating configuration or code issues which could allow an attacker to exploit an environment. It can be deployed as...

  • November 24, 2022

    Companies invest millions to implement the latest and greatest security tools, yet bad user habits continue to expose them to cyberattacks. Users, it turns out, are the weak link in enterprise security. According to research from Incogni: · 74.1% of...

  • November 22, 2022

    Patch management used to be an internal duty that was manually intensive duty. For some, it still is. More recently, alternatives have emerged such as automated patch managed, hosted patch management, and patch management as a service. However it is...