


The Zero-Day Dilemma
In boxing, it’s often said that the punch you don’t see coming is the one that puts you down. Unfortunately, this adage rings just as true for cybersecurity. Last month, Google reported that they’d discovered four new zero-day exploits targeting flaws in the...
Learning from Breaches: How to Mitigate the Risk of Third Party Applications
Major security technology providers are getting hacked. Even more alarming is these same security organizations are not discovering their own breaches in a timely manner, if at all! These breaches are frequently discovered months after the actual compromise took...
SolarWinds Attack: Top 6 Things You Need to Know
A supply chain attack has trojanized SolarWinds Orion via regular software updates in order to laterally distribute malware that is being referred to as SUNBURST. Here are the top six need to know questions and answers that IT managers, CISOs, CIOs, MSPs or anyone...