Reports

Russian Hacker Concept

Connecting The Dots: The Kremlin’s Links to Cyber Crime

The question of whether or not Russia has been involved in ongoing cybercrime is on the minds of many. A new report by Analyst1 offers new intelligence on the matter.

As Mobile Fraud Rises, The Password Persists

A new study released by Incognia that measures user friction in mobile financial apps yields important results about the fate of the password.

Hooded Hacker Concept Image

Spotting Hackers at the Pace of XDR – From Alerts to Incidents

Extended Detection and Response (XDR) technology is gaining traction within enterprises. But how can organizations handle the increased volume of alerts XDR systems produce? Samuel Jones, of cyber AI firm Stellar Cyber, discusses how embracing incident-based systems can reduce the analyst burden of XDR technology, enabling companies to spot and respond to attacks more quickly.

SolarWinds Hacked Image

What SolarWinds Tells Us About Securing the Software Development Supply Chain

The recent SolarWinds attack highlights an Achilles heel for enterprises: software updates for critical enterprise applications. Digital signing of code is one solution, but organizations need to modernize their code signing processes to prioritize security and integrity and align with DevOps best practices, writes Brian Trzupek the Senior Vice President of Products at DigiCert in this thought leadership article.

The SOC Hop Needs to be a Relic of the Past

Overworked, understaffed teams constantly jumping from one fire to the next – exhausted and reactive to events and alerts. The “SOC hop” is not sustainable.