Reports

As Mobile Fraud Rises, The Password Persists

A new study released by Incognia that measures user friction in mobile financial apps yields important results about the fate of the password.

Hooded Hacker Concept Image

Spotting Hackers at the Pace of XDR – From Alerts to Incidents

Extended Detection and Response (XDR) technology is gaining traction within enterprises. But how can organizations handle the increased volume of alerts XDR systems produce? Samuel Jones, of cyber AI firm Stellar Cyber, discusses how embracing incident-based systems can reduce the analyst burden of XDR technology, enabling companies to spot and respond to attacks more quickly.

SolarWinds Hacked Image

What SolarWinds Tells Us About Securing the Software Development Supply Chain

The recent SolarWinds attack highlights an Achilles heel for enterprises: software updates for critical enterprise applications. Digital signing of code is one solution, but organizations need to modernize their code signing processes to prioritize security and integrity and align with DevOps best practices, writes Brian Trzupek the Senior Vice President of Products at DigiCert in this thought leadership article.

The SOC Hop Needs to be a Relic of the Past

Overworked, understaffed teams constantly jumping from one fire to the next – exhausted and reactive to events and alerts. The “SOC hop” is not sustainable.

Deep Fake Faces

Can Blockchain Solve Data’s Integrity Problem?

The rapid digitalization and automation of business processes makes data integrity critical, as low-quality data risks infecting automated business decision process. Authors Dan Geer and T. Mark Morley suggest that blockchain may offer one solution to the data integrity problem.