Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

VoIP Termination: The Ultimate Guide for Businesses and Service Providers

In the ever-evolving landscape of telecommunications, Voice over Internet Protocol (VoIP) has emerged as a game-changer, revolutionizing how businesses and individuals communicate. At the heart of this technology lies a crucial component: VoIP termination. This comprehensive guide will delve into the intricacies of VoIP termination, exploring its significance, mechanics, and impact on modern communication systems.

Using CNC Milling for the Production of Secure, Tamper-Proof Devices

In today's high-tech world, the need for secure and tamper-proof devices is paramount. From banking systems to defense equipment, these devices are crucial for ensuring safety, privacy, and integrity. One of the key manufacturing techniques used to create these secure components is CNC milling. With its precision and versatility, CNC milling is playing an essential role in the production of tamper-proof devices that offer both physical and cyber protection.

Meet SmartRisk Agent: Unlock Your New Human Risk Management

Depending on who you ask, between 70 and 90 percent of cyber risk has human error as the root cause. That's why Human Risk Management (HRM) is so important. And here is the next major advance in HRM. We're thrilled to announce the second version of our risk score architecture. It is so far advanced we have renamed—promoted really—our initial "Virtual Risk Officer" to SmartRisk Agent.

CTEM step-by-step guide | Stage two: Discovery

Welcome to our blog series on Continuous Threat Exposure Management (CTEM), where we dig into the five essential stages of implementing a robust CTEM program. Coined by Gartner in 2022, CTEM is a powerful process that can help continuously manage cyber hygiene and risk across your environment. It’s also a lot to think about when you’re starting out, so it helps to break things down.

"Operation Kaerb" Takes Down Sophisticated Phishing-as-a-Service Platform "iServer"

A partnering of European and Latin American law enforcement agencies took down the group behind the mobile phone credential theft of 483,000 victims. Someone steals a physical mobile phone and they need to unlock it. But to do so, you need the Apple ID or Google account of the phone’s owner. So, where do you go? Well, it used to be iServer – an automated phishing-as-a-service platform that could harvest credentials to unlock the stolen phones.

8 Obstacles to Effective Remediation Plan Execution

We’ve all seen it happen: you create a solid remediation plan, map out the misconfigurations and vulnerabilities, and develop a plan to fix them, but when it comes time to execute, things start to fall apart. Why do remediation plans fail even when they seem solid on paper? The truth is, it’s often not the plan itself, but how it’s executed. Let’s break down the common obstacles that cause remediation efforts to go wrong and what you can do to avoid them.

Six Signs that Exposure Management is Right for Your Organization

Whether you’re the CISO or part of the incident response team, it’s likely you have heard of exposure management (EM). Introduced by Gartner in 2022 as the evolution of vulnerability management (VM), the name “exposure management” was adopted by vendors faster than you can say “next gen” or “AI-powered”. Unfortunately for consumers the hype added more confusion than clarity. This blog is a chance to reset expectations.

Get to know our new Domains page

Earlier this year, we launched a new Domains page to give you more powerful and flexible attack surface insights. When the recent CUPS vulnerability hit the news, our new page quickly allowed users to create a policy to detect potential threats on port 631—something that wasn’t possible before. Since then, we’ve rolled out dozens of improvements to help security teams like yours feel more confident in managing their ever-changing attack surface.