What Verizon's Latest Hacker Report Tells Us (And What to Do About It)
A breakdown of the key findings from Verizon's DBIR 2025 report, including vulnerability exploitation trends, ransomware developments, human factors, third-party risks, and AI security considerations.
Single Point of Failure - Lessons from the CVE Funding Scare
The recent CVE funding crisis reveals the risks of relying on a single vulnerability database. Get more information about why organizations need diverse intelligence sources and better internal risk assessment to strengthen security posture.
The Door Wedge Is A Lesson in Cybersecurity
The common door wedge is a great analogy for cybersecurity: Learn more about balancing security and convenience, and how well-intentioned shortcuts can lead to unintended consequences.
When TLS Is Not Enough
A recent court ruling in Germany highlights the limitations of TLS encryption for email security and the need for end-to-end encryption.
Gmail AI Assistant: Convenient But Potentially Compromised
Exploring security vulnerabilities in Gmail AI features including indirect prompt injection and link trap risks, and the stance of Google on these issues