Adopt Next-Gen Access to Power Your Zero Trust Strategy
Security breaches are now all too commonplace — 58% of organizations have experienced at least one in the past 12 months. As a result,...
Calisto Trojan for macOS
An interesting aspect of studying a particular piece of malware is tracing its evolution and observing how the creators gradually add new monetization or...
Imperva Cloud Security Now Available Through UK Government’s GCloud 10 Digital Marketplace
Building on the success of Imperva listing our market-leading, single stack Incapsula cloud platform for DDOS protection; CDN; load balancing and WAF on the...
Leading a DevOps Transformation
Leading a DevOps Transformation #outlook a{ padding:0; } body{ width:100% !important; }...
The Cost of Customer Identity & Access Management (CIAM)
Customer Identity and Access Management (CIAM) is essentially a set of tools that allow your business to securely authenticate, manage and engage customers who...
The return of Fantomas, or how we deciphered Cryakl
In early February this year, Belgian police seized the C&C servers of the infamous Cryakl cryptor. Soon afterwards, they handed over the private keys...
Persistence Pays Off
There are lots of maxims in the startup world about passion, patience and perseverance — but most of the time it is just lip...
Need for Speed: Optimizing Data Masking Performance and Providing Secure Data for DevOps Users
Let’s start with a pretty common life experience — you identify a need (e.g., transportation), you evaluate your options (e.g., evaluate car manufacturers, various...