Published by the leading IT consulting firm Gartner, Magic Quadrants are a series of market...
Security & Compliance Blog
What Is Security Orchestration, Automation, and Response (SOAR)?
A relatively new platform for data security is Security Orchestration, Automation, and...
An Introduction to Security Debt
A subset of technical debt, security debt is essentially the vulnerabilities and flaws in your...
Security Automation for 2020 and Beyond
Security automation refers to machine-actions that monitor, detect, troubleshoot and remediate...
What is Security As Code?
Businesses have quickly and sophisticatedly embraced cloud technology to super-serve customers and...
What Is a Cyber Resilience Strategy?
Organizations’ dependence on internet-based technologies continues to hit new heights as...
Digital Forensics and Incident Response (DFIR): An Introduction
Digital forensics and incident response is an important part of business and law enforcement...
The Windows Curveball Vulnerability and What You Can Do About It
What is Curveball? I like to watch baseball, and am amazed at pitchers who can throw a good...