Stratascale
Stratascale

Latest Articles

Three Key Takeaways from SecureWorld Charlotte

Three Key Takeaways from SecureWorld Charlotte

Apr 26, 2024

Insights from the information-packed cybersecurity conference.

Don’t Ignore Attack Surface during M&A

Don’t Ignore Attack Surface during M&A

Feb 29, 2024

Why you want to assess an organization’s attack surface before you integrate or take ownership.

Embracing the Future of Offensive Security Balancing Automation with Expertise

Embracing the Future of Offensive Security Balancing Automation with Expertise

Feb 15, 2024

Discussing the benefits and challenges of using automation in offensive security

Unwrapping Security for the Holidays: 4 Tips for Cybersecurity in Hospitality

Unwrapping Security for the Holidays: 4 Tips for Cybersecurity in Hospitality

Dec 4, 2023

Learn about some core cybersecurity practices for the hospitality industry and how you can use them to protect your business this holiday season.

Acquisition Cybersecurity: Leaving cybersecurity hanging will cause irritation later

Acquisition Cybersecurity: Leaving cybersecurity hanging will cause irritation later

Oct 31, 2023

An article discussing the value of Governance, Risk & Compliance (GRC) in the context of Mergers & Acquisitions (M&A), with some guidance on how to do it right.

Your Attack Surface is not just a Buzzword

Your Attack Surface is not just a Buzzword

Jun 23, 2023

In the ever-evolving world of technology, it’s easy to dismiss new concepts as mere buzzwords. But one idea you can’t afford to overlook is your attack surface. A robust attack surface management program allows organizations to see through the eyes of a hacker by going beyond identifying risks. Learn more in our article.

The Metaverse: Securing the Future

The Metaverse: Securing the Future

Mar 16, 2023

As the metaverse expands, so do the security risks associated with it.

Beyond Automated Cloud Security

Beyond Automated Cloud Security

Sep 30, 2022

Understand the organization behind the cloud and improve your cloud security without an overreliance on automated data collection.

Innovations pushing the boundaries of Cybersecurity

Innovations pushing the boundaries of Cybersecurity

May 13, 2022

While technological leaps are fascinating, it’s important to also design systems with resiliency in mind to keep your data safe.

ASM/CV: Vendors to Watch, Know, Understand

ASM/CV: Vendors to Watch, Know, Understand

Jan 21, 2022

This Vendor Insights document supports the findings in our recent Horizon Report on Attack Surface Management.

Stratascale Threat Advisory: Everything You Need to Know About the Critical Apache Log4j Remote Code Execution Vulnerability

Stratascale Threat Advisory: Everything You Need to Know About the Critical Apache Log4j Remote Code Execution Vulnerability

Dec 14, 2021

The critical vulnerability associated with Log4j, a Java-based logging utility widely used in commonly deployed enterprise systems, was publicly disclosed on December 9, 2021.

Moving Closer to Zero Trust with Stronger Identity and Access Management

Moving Closer to Zero Trust with Stronger Identity and Access Management

Nov 4, 2021

Zero trust architecture (ZTA) possesses numerous advantages as a security objective to limit internal and external risks. The problem? Achieving 100% ZTA is nearly impossible due to the considerable undertaking and expense required.

If You’re Serious About Performance, It’s Time to Talk About SASE

If You’re Serious About Performance, It’s Time to Talk About SASE

Oct 29, 2021

Software as a Service (SaaS) is now practically the norm for several key workloads and applications. And everyone expects outstanding performance, no matter when or where they log in.

It’s Time to Evolve Your Protection with a Modern SOC

It’s Time to Evolve Your Protection with a Modern SOC

Oct 29, 2021

Protecting your enterprise from breaches and bad guys in the cloud era means staying several steps ahead. If your Security Operations Center (SOC) fails to keep up with changing technologies and tactics, your risks multiply significantly.

Keeping Pace with the Ever-Changing Scope of Data Protection

Keeping Pace with the Ever-Changing Scope of Data Protection

Sep 28, 2021

Data security has always been challenging. But the shift to a remote workforce has made security even more important, and many more times complex.