How to Define Your Security Objectives Before Choosing an MDR Provider Security With nearly every MSSP and Security company claiming to do… rooter September 23, 2024 1 min read 0
Hacking the “Bike Angels” System for Moving Bikeshares Security I always like a good hack. And this story delivers.… rooter September 23, 2024 2 min read 0
Seven (7) Key Principles to Prevent Cyberattacks Security In today’s digital world, cyberattacks are becoming more frequent and… rooter September 23, 2024 1 min read 0
Attack Surface Management v/s Vulnerability Management: Know the Difference! Security Attack surface management and Vulnerability Management have always been mistaken.… rooter September 23, 2024 1 min read 0
Weekly Update 418 Security Presently sponsored by: 1Password Extended Access Management: Secure every sign-in… rooter September 22, 2024 2 min read 0
FBI, CISA warning over false claims of hacked voter data – Week in security with Tony Anscombe Security With just weeks to go before the US presidential election,… rooter September 21, 2024 1 min read 0
Friday Squid Blogging: Squid Game Season Two Teaser Security The teaser for Squid Game Season Two dropped. Blog moderation… rooter September 21, 2024 1 min read 0
Clever Social Engineering Attack Using Captchas Security This is really interesting. It’s a phishing attack targeting GitHub… rooter September 20, 2024 1 min read 0
Chicago API Security Summit 2024 Security Thank You Chicago! Earlier this week we had the pleasure… rooter September 20, 2024 4 min read 0
Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6) Security How do analyst relations professionals ‘sort through the noise’ and… rooter September 20, 2024 1 min read 0