Opinion

Developer sitting in front of computers.

Attacks on APIs demand a Security Re-Think

New threats demand that we transform the way we think about securing the endpoints. Case in point: APIs, writes Ross Moore.

Internet of Things Zombies

Forget the IoT. Meet the IoZ: our Internet of Zombie things

A school that never sleeps? Cameras that go dark? A dead company hacked back to life? Welcome to the growing Internet of Zombie devices that threatens the security of the Internet.

burning lock image

IoCs vs. EoCs: What’s the difference and why should you care?

Security analysts and threat hunters know the importance of IOCs – indicators of compromise. But EOCs – enablers of compromise – are just as important.

Threat Detection illustration

What’s the Future of Detection Teams? Five Predictions for What Lies Ahead 

Cyber threats are rampant, but security teams lack the tools, resources, and support to do their jobs effectively today — much less prepare them for tomorrow. In this Expert Insight, Jack Naglieri, the CEO of Panther, writes about where the state of security is currently, and where I see it headed.

5G Tower

Why digital certificates are critical to 5G security

As 5G gains traction, service providers need to be able to trust their networks’ security to truly take advantage of 5G’s capabilities. Digital certificates are critical to that, writes Alexa Tahan of Nokia.