Featured Blog
Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security
Earlier this week, Krebs on Security reported that an employee of the Department of Governmental Engineering (DOGE) accidentally published a secret API key that granted access to unreleased AI models from Elon Musk’s xAI venture (source). Even more disturbing: researchers found the DOGE API key still worked after the employee was notified of the leak […]
Supply Chain Cybersecurity, Third Party Risk Management, Vendor Risk Management
Top 3 Reasons Third-Party Vendor Risk Management is Not Easy
Cybersecurity, Cybersecurity Planning
Six Cybersecurity Best Practices That Fit Almost Any Organization’s Budget
Supply Chain Cybersecurity, Third Party Risk Management, Vendor Risk Management
The Other Side of Supply Chain Security: Tips for Organizations Being Assessed by Enterprise Clients
Cybersecurity Planning, News, Policy Development
5 Rules to Live by For Strong Cybersecurity Policy Development
Pen Testing, Web application security
Why Web Application Security Assessments Should Move Up Your To-Do List
Cloud, Cybersecurity, Cybersecurity Planning, News, Ransomware, Supply Chain Cybersecurity