Active loading indicator
1 – 30 of 466 items
[]
466 results
25 March 2025
Explainer
What are Digital Credentials?

Digital credentials are a secure way to verify an identity without paper credentials. Examples include digital badges and digital certificates.

Digital credentials
25 March 2025
Insights
Why Social Engineering Still Works

Social engineering will always be a problem, but we can all do our part to make scammers' jobs harder.

Social engineering
17 March 2025
Explainer
What Is Privilege Escalation?

Privilege escalation is a cyberattack technique in which a threat actor alters or elevates their permissions in a target system.

Privileged access management
14 March 2025
Explainer
What is Biometric Authentication?

Biometric authentication uses physical features—like facial features, iris scans or fingerprints—to verify peoples' identities.

Biometric authentication
11 March 2025
Explainer
What is Threat Intelligence?

Threat intelligence is detailed, actionable threat information for preventing and fighting cyberthreats targeting an organization.

Threat intelligence
28 February 2025
Explainer
What is Customer Identity and Access Management (CIAM)?

Customer identity and access management (CIAM) manages the digital identities of customers and other external end users.

Consumer identity and access management
21 February 2025
Explainer
What is The Common Vulnerability Scoring System (CVSS)?

The Common Vulnerability Scoring System (CVSS) is a widely used framework for classifying and rating software vulnerabilities.

Vulnerability scoring
18 February 2025
Explainer
What is Digital Identity?

A digital identity is a profile tied to a specific user, machine or other entity in an IT ecosystem. Digital IDs help track activity and stop cyberattacks.

Digital identity
04 February 2025
News
DeepSeek's rise prompts essential security dialogue

Chinese AI startup DeepSeek is emerging as a competitive player in the generative AI space, but security experts are raising concerns about potential vulnerabilities in its platform. Here's what you need to know.

AI security
27 January 2025
Explainer
What Is Tokenization?

Tokenization converts sensitive data into a nonsensitive digital replacement that maps back to the original in order to protect sensitive information.

Tokenization
23 January 2025
Explainer
What Is ASPM?

ASPM is a cybersecurity approach that focuses on safeguarding applications against security threats throughout the application lifecycle.

Application security
17 January 2025
Explainer
Data Sovereignty vs. Data Residency

Data sovereignty determines who has authority over data. Data residency refers to the geographical location of data.

Data security
07 January 2025
Explainer
What Is Threat Hunting?

Threat hunting is a proactive approach to identifying previously unknown and ongoing threats in an organization's network.

Threat hunting
06 January 2025
Explainer
What Is Data Detection and Response (DDR)?

Data detection and response (DDR) is a cybersecurity technology that monitors and protects data in any format and location across multicloud environments.

Data detection and response
30 December 2024
News
DHS: Guidance for AI in critical infrastructure

At the end of 2024, we've reached a moment in AI development where government involvement can help shape the trajectory of this pervasive technology.

AI security
26 December 2024
News
Apple Intelligence raises stakes in privacy and security

Apple Intelligence promises unparalleled convenience and personalization — while also highlighting the inherent risks of entrusting critical processes to AI.

AI security
23 December 2024
News
FYSA – Adobe Cold Fusion Path Traversal Vulnerability

Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure.

Security vulnerabilities
23 December 2024
Explainer
Ransomware attack on Rhode Island health system exposes data of hundreds of thousands

Rhode Island ransomware attack exposes residents' personal data from Medicaid and SNAP. Discover the breach's impact and recovery steps.

Ransomware
17 December 2024
Explainer
What is Secrets Management?

Secrets management is the protection of credentials—including certificates, passwords and tokens—for nonhuman users, such as apps, servers and workloads.

Secrets management
16 December 2024
News
FBI, CISA issue warning for cross Apple-Android texting

CISA and the FBI announced that a cyber espionage campaign from the People's Republic of China is targeting commercial telecommunications infrastructure.

Mobile security
13 December 2024
Insights
Making smart cybersecurity spending decisions in 2025

With cybersecurity a top focus for many businesses in 2025, cybersecurity is likely to be a top-line item on many budgets heading into the New Year.

Cybersecurity
12 December 2024
Explainer
What is CNAPP (Cloud-Native Application Protection Platform)?

A cloud-native application protection platform (CNAPP) is comprehensive cybersecurity software that integrates cloud security solutions (CIEM, CWPP, CSPM) into a single, unified platform.

CNAPP
12 December 2024
Insights
Security roundup: Top AI stories in 2024

With the AI landscape rapidly evolving, it's worth looking back before moving forward. These are our top five AI security stories for 2024.

AI security
11 December 2024
Insights
Why identity threat detection and response matters: 5 key risks

Identity threat detection and response are designed to detect these five types of identity-based risks that SIEM and UBA often fail to address.

Identity and access management
10 December 2024
Explainer
What Is Data Poisoning?

Data poisoning occurs when threat actors manipulate or corrupt the training data used to develop artificial intelligence (AI) and machine learning (ML) models.

Data poisoning
09 December 2024
Insights
How I got started: Incident responder

What is it about being an incident responder that makes people want to step up for this crucial cybersecurity role? IBM's Dave Bales shares his insights.

Incident response
09 December 2024
Explainer
What Is Security Posture?

Security posture is an indicator of an organization’s security status. Its strength is determined by the security controls and security policies in place.

Security posture
09 December 2024
News
Zero-day exploits underscore rising risks for internet-facing interfaces

The surge in attacks on internet-facing management interfaces such as Palo Alto Networks' Next-Generation Firewalls highlights an evolving threat landscape.

Zero-day
06 December 2024
Insights
How TikTok is reframing cybersecurity efforts

From HackerOne's Global Bug Bounty to a few of TikTok's top cybersecurity creators, you may be surprised by how the app is promoting cybersecurity.

Cybersecurity
04 December 2024
Insights
Cloud threat report: Possible trend in cloud credential "oversaturation"

The cost of stolen cloud credentials on the dark web has steadily decreased since 2022. Have cyber criminals finally oversaturated the market?

Cloud security
1 – 30 of 466 items