What Verizon's Latest Hacker Report Tells Us (And What to Do About It)

A breakdown of the key findings from Verizon's DBIR 2025 report, including vulnerability exploitation trends, ransomware developments, human factors, third-party risks, and AI security considerations.

April 23, 2025
Read more

Single Point of Failure - Lessons from the CVE Funding Scare

The recent CVE funding crisis reveals the risks of relying on a single vulnerability database. Get more information about why organizations need diverse intelligence sources and better internal risk assessment to strengthen security posture.

April 17, 2025
Read more

The Door Wedge Is A Lesson in Cybersecurity

The common door wedge is a great analogy for cybersecurity: Learn more about balancing security and convenience, and how well-intentioned shortcuts can lead to unintended consequences.

February 10, 2025
Read more

When TLS Is Not Enough

A recent court ruling in Germany highlights the limitations of TLS encryption for email security and the need for end-to-end encryption.

February 8, 2025
Read more

Gmail AI Assistant: Convenient But Potentially Compromised

Exploring security vulnerabilities in Gmail AI features including indirect prompt injection and link trap risks, and the stance of Google on these issues

January 4, 2025
Read more
Showing 6-10 of 20 posts • Page 2 of 4