Featured Blog
Exposed Secrets, Broken Trust: What the DOGE API Key Leak Teaches Us About Software Security
Earlier this week, Krebs on Security reported that an employee of the Department of Governmental Engineering (DOGE) accidentally published a secret API key that granted access to unreleased AI models from Elon Musk’s xAI venture (source). Even more disturbing: researchers found the DOGE API key still worked after the employee was notified of the leak […]
Cybersecurity, Cybersecurity Planning
What’s Hot in Cybersecurity? Recapping the Top 2023 Cybersecurity Trends from Black Hat, DEFCON, and BSides
Cyberattacks, Cybersecurity
2023 Cyberattack Trends: Zero-Day Attacks, Virtualization Vulnerabilities & More
Attack Surface Monitoring, Cybersecurity, Security Controls Reports
Q3 2023 Top Cybersecurity Control: Attack Surface Monitoring
Cybersecurity Planning, Risk Assessments
How to Ensure Your Cybersecurity Risk Assessment Results are Actionable
Cybersecurity Planning, Risk Assessments
How to Measure Cybersecurity Risk: The Secret to Getting the Maximum Value From a Risk Assessment
Web application security
Web App Pentesting: A 7-Step Checklist for Uncovering Hidden Vulnerabilities
Cybersecurity, Cybersecurity leadership, Cybersecurity Planning, Resource, Security Controls Reports, vCISO