DataDome's point of presence (PoP) network has expanded to over 30 locations worldwide, delivering seamless, fast protection ...
By Daniel Kelley Security Researcher We recently uncovered GoIssue, a tool marketed on a cybercrime forum that allows ...
New guidance for organizations seeking to protect the generative AI tools they're running has been released by the OWASP Top ...
National insurance firm Crum and Forster is offering a professional liability program for CISOs who are facing growing ...
Discover the 5 best vendor risk management solutions, designed to help you mitigate third-party risks while ensuring ...
I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to ...
← Scaling Global Protection: DataDome Expands to Over 30 Points of Presence (PoP) Worldwide Context is King: Using API ...
Flare recently hosted our first Threat Intel Workshop with Senior Threat Intelligence Researcher Tammy Harper. Below are some of the questions Tammy covered in improving threat intelligence collection ...
API attacks can be costly. Really costly. Obvious financial impacts like legal fines, stolen finances, and incident response budgets can run into the hundreds of millions. However, other hidden costs ...
In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election ...
Deployment of 5G and AI-enhanced IoT systems is accelerating. This, in turn, is driving up the number of IoT-connected ...
Your internet account passwords are probably among the most guarded pieces of information you retain in your brain. With ...