The Cost of Customer Identity & Access Management (CIAM)

Customer Identity and Access Management (CIAM) is essentially a set of tools that allow your business to securely authenticate, manage and engage customers who...

The return of Fantomas, or how we deciphered Cryakl

In early February this year, Belgian police seized the C&C servers of the infamous Cryakl cryptor. Soon afterwards, they handed over the private keys...

Persistence Pays Off

There are lots of maxims in the startup world about passion, patience and perseverance — but most of the time it is just lip...

Need for Speed: Optimizing Data Masking Performance and Providing Secure Data for DevOps Users

Let’s start with a pretty common life experience — you identify a need (e.g., transportation), you evaluate your options (e.g., evaluate car manufacturers, various...

Clone of Careers

キャリア Digital Guardianは、データ中心のセキュリティを10年以上ご提供してきた経験と、世界レベルのツールを組み合わせて、お客様のデータを盗み出そうとする窃盗犯の一歩先を行くことを可能にします。弊社チームにご参加ください。 - Read more

Latest article

Substack Breach May Have Leaked Nearly 700,000 User Details Online

Substack says hackers accessed user emails, phone numbers, and internal metadata in October 2025, with a database of 697,313 records later posted online. The post...

Cryptojacking Campaign Exploits Driver to Boost Monero Mining

Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics - Read more

The Phone is Listening: A Cold War–Style Vulnerability in Modern VoIP

I don’t know about you, but when I think about “critical vulnerabilities,” I usually picture ransomware, data theft, or maybe a server falling over...

[R1] Security Center Version 6.8.0 Fixes Multiple Vulnerabilities

Security Center Version 6.8.0 Fixes Multiple Vulnerabilities Arnie Cabral Wed, 02/18/2026 - 08:32 Security Center leverages third-party software to help provide underlying functionality....