We’re incredibly proud to share some exciting news at Impart Security: We’ve achieved SOC 2 Type 2 certification! This ...
As DDoS attackers become more sophisticated and the attack surface grows exponentially, businesses must expand beyond an ...
The words risk, threat, and vulnerability are commonly used interchangeably, but they mean different things. Understanding ...
What’s the craic? Reuters’ Christopher Bing reports: Hundreds of thousands of US internet routers destroyed Bricking devices ...
Randall Munroe, creator of XKCD Permalink ...
Our new Third Party Risk Assessment app, TPRA. And it’s now available to current customers! Observable third-party risk ...
Celebrate 10 years of BSides Knoxville, featuring discussions of AI in security, historical hacking, and holistic protection, ...
In today’s data-driven world, protecting personal information is of greater significance. The International Organisation for ...
AI has the potential to revolutionize industries and improve lives, but only if we can trust it to operate securely and ...
This cybersecurity playbook is inspired by David Cross’s insights on how to best handle a potential incident that could have ...
The head of the U.S. Senates Finance Committee is pushing the Biden Administration to investigate what he called UnitedHealth Group’s “numerous cybersecurity and technology” that led to the massive ...
In my previous post, I explored the idea that different tools can implement the same operation chain (behavior) in various ways. I referred to these various ways as execution modalities. In that post, ...