Featured Blog
The Saga Continues: More Dirt on the Salesforce–Drift Breach
Last week, we shared lessons from the Salesforce–Drift breach, focusing on connected apps, OAuth tokens, and practical prevention strategies. Since then, the story has gotten bigger — and the lessons even more urgent. Hundreds of organizations have now confirmed they were impacted, including Cloudflare, Palo Alto Networks, Zscaler, Proofpoint, and financial services firms like Wealthsimple. […]
Attack Surface Monitoring, Vulnerabilities, Vulnerability Scanning
Why Continuous Vulnerability Management Is the Top Cybersecurity Control for Q2 2025
Cryptography, Quantum Computing and Cybersecurity
Quantum Computing and Cybersecurity: How to Secure the Quantum Future
Web application security
Are Your AI-Backed Web Apps Secure? Why Prompt Injection Testing Belongs in Every Web App Pen Test
cybersecurity training, Incident Response
Critical Incident Response Training: Your Top Questions Answered
Data encryption, Email Encryption