Vol 5 of our Cybersecurity Horizon Report looks at how to combat increasingly complex attack surfaces The ubiquitous adoption of digital business—where remote workers, extended supply chains, and [...]
What is the Log4j vulnerability? CVE-2021-44228, the critical vulnerability associated with Log4j, a Java-based logging utility widely used in commonly deployed enterprise systems, was publicly [...]
Zero trust architecture (ZTA) possesses numerous advantages as a security objective to limit internal and external risks. The problem? Achieving 100% ZTA is nearly impossible due to the [...]