Featured Blog
Google Gemini Changed the Rules: Are Your API Keys Exposed?
For years, Google told developers that certain API keys were not secrets. They were described as project identifiers—safe to embed in client-side code for Maps or Firebase, especially with referrer restrictions. Then something changed. “Google retroactively turned API keys that were meant to be public into sensitive credentials,” said Tom Pohl, Head of Penetration Testing at LMG […]
Cybersecurity, Supply Chain Cybersecurity, Third Party Risk Management, Vendor Risk Management, Vulnerabilities
Made in China—Hacked Everywhere? What Organizations Need to Know Now
Cyberattacks
Holiday Hackers: How AI Is Supercharging Seasonal Fraud—and What Your Organization Must Do Now
Cyberattacks, Cybersecurity leadership, Incident Response