Blog
By Robert Lemos
The security features for verifying the source of an email header fail to work together properly in many implementations, according to a team of researchers. Three standards for email security that are supposed to verify the source of a message have critical implementation differences that could allow attackers to send
5 Core Tenets for Effective Multicloud Security
July 24, 2020
0 Comment
By Chris Collard
For a growing number of organizations adopting cloud-based deployment models, the cloud security challenge is clear. For example, how do I rapidly transform my business in a way that is also secure and compliant? Business leaders have an opportunity to rethink securing their enterprise during the sea-change shift toward cloud
By Anshul Garg
Security vendors and end users have access to the same technology and resources, if not more, than the threat actor community. However, the area where cybersecurity falls short as an industry is teamwork. Vendors and end users rarely talk to each other as a broader force. Thus, while innovation may happen
By Adrian Zmudzinski
According to Pavol Luptak, “cryptocurrencies or crypto markets may undermine government laws and regulations that are obsolete for the 21st digital century.” Cryptocurrencies may render some outdated regulations obsolete, according to crypto-anarchist and white hat hacker Pavol Luptak. According to Luptak, “cryptocurrencies or crypto markets may undermine government laws and
Cybersecurity Lessons from the Pandemic
July 22, 2020
0 Comment
By Monica Verma
How does cybersecurity support business and society? The pandemic shows us. There is absolutely no absolute security. Nature is designed in a way that things can and eventually will go wrong. This is true both for pandemics and cybersecurity incidents. The world wasn’t fully prepared for a pandemic like COVID-19.




