top of page


Zero days weaponized on edge devices and servers: rethink your risks
Vulnerabilities in public facing edge devices and apps are being exploited prior to disclosure, let alone patching. Several lessons learned.
Aug 1, 2023


CPS risk management - what's it about?
Risk management in OT environments is different than traditional IT. Hence the rise of OT risk management software.
Jul 27, 2023


SASE architecture - a blueprint for MSSPs
Managing IT security, connecting branches and remote users - all this requires too much work. A new architecture is required.
Jul 25, 2023


Access controls and data-at-rest encryption go hand in hand
Sensitive data exfiltration by way of internal or external malicious users requires rethinking access control and data-at-rest encryption.
Jul 21, 2023


Protecting public web services with WAF - things to watch
Publishing web apps expands the attack surface and complicates management. The not so typical list of things to watch when looking for a WAF
Jul 20, 2023


Are the attacks on Red Hat valid?
The attacks are not justified: Red Hat is a victim of its own success but also a late comer to the cloud IaaS market.
Jul 17, 2023


Microsoft re-entering network security and slowly but surely ditching Active Directory brand
After more than a decade, Microsoft appears to be reentering the competitive network security market, currently dominated by established...
Jul 15, 2023


Most Fortigate devices still open to attack in the Adriatics
A quick search within the Adriatics region reveals almost 60% are unpatched, allowing malware deployment. What are the lessons?
Jul 11, 2023


MOVEit breach fallout still resonates
More than a month since the MOVEit software breach, the fallout is still ongoing: last week PBI Research (a data management provider)...
Jun 28, 2023
bottom of page
