Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Software Supply Chain Security
DevSecOps
Securing the Software Supply Chain with Open Policy Agent: Policies for Pull Requests and Beyond

April 21, 2023

Cloud Security
Open Source Security
Software Supply Chain Security
Fortifying Cloud Security Posture Management with Open Policy Agent (OPA)

April 5, 2023

Network Security
Threat Integrations
Security Products: Challenge, Accessibility, Approach to test

January 19, 2023

Open Source Security
Software Supply Chain Security
Threat Intelligence
Discock Stealer - Another Polymorphic Malware like WASP Stealer

January 13, 2023

Threat Integrations
Threat Intelligence Connector for OpenCTI Cyber Threat Intelligence Platform

December 2, 2022

Vulnerability Management
Open Source Security
Open Vulnerability Assessment Language (OVAL) in a Nutshell - Part 2

August 27, 2022

Vulnerability Management
Threat Intelligence
Ransomware
Detecting Atlassian Confluence Exploitation - CVE-2022-26134

July 22, 2022

Threat Integrations
Cisco Umbrella Reporting Integration with Cortex XSOAR

March 31, 2022

Vulnerability Management
Compliance & Risk Management
Open Vulnerability Assessment Language (OVAL) in a Nutshell

January 7, 2022

Threat Integrations
Palo Alto Networks Cortex XSOAR Integration

September 9, 2021

Threat Integrations
Is it time for leading Threat Intelligence Platforms to support custom objects such as Wallet IDs, Cryptocurrency address for Cryptocurrency Threat Intelligence providers?

August 23, 2021

Threat Intelligence
Vulnerability Management
Emerging Threats and Vulnerabilities in Cybersecurity

June 3, 2021

Sign up to our Newsletter