Blog
Adapting to Modern Threats in Cloud Security
April 28, 2025
0 Comment
by Amy Cohn
Are You Effectively Managing Your Non-Human Identities? For quite a while, organizations have been grappling with numerous cybersecurity challenges. However, one obstacle stands out – the management of Non-Human Identities (NHIs) and their secrets. These NHIs, linked with a unique secret as an identifier, pose quite a number of threats
by Dale Zabriskie
The time is now to employ a robust business resilience strategy to ensure continued success in the digital age. The Skinny Don’t ‘just’ defend your data: Catastrophic ransomware attacks have become a fact of life for today’s businesses. While preventative security measures are important, organizations must have a recovery and response
By Thomas Caldwell
The concept of swarming has captured my technical imagination for years. Nature has figured this out with how bees, ants and birds can collaborate, cooperate and reach consensus on a mission or objective. Now that we’re entering the era of agentic AI, swarming is coming into existence under the concept
Emerging threats affecting supply chains in 2025
April 23, 2025
0 Comment
by Preeti Anand
Supply chains in 2025 face critical threats like ransomware, third-party breaches, AI-driven cyberattacks, and IoT vulnerabilities, demanding stronger cybersecurity efforts. The backbone of the global economy is now supply chains that are being exposed to a wave of cyber threats. With the speed of digital transformation and increase in interconnected
It’s Time to Stop Accepting Losses in Cybersecurity
April 22, 2025
0 Comment
by John Kindervag
Cybersecurity is in a state of emergency. Attacks are increasing in scale, frequency, and sophistication, yet organizations still struggle to take decisive action. Instead of confronting threats head-on, many hide behind outdated notions of “risk management,” a term that has become a crutch and an excuse for inaction. The word “risk” gives