Why Identity and Access Management is the New Public Cloud Perimeter

Identity and Access Management (IAM) has become a key security battleground for attackers and defenders. Unfortunately, many defenders not only lack the expertise to fight this battle, but they [...]

How Advanced Persistent Threats Work

The term Advanced Persistent Threat, or APT, was apparently first coined at the United States Air Force in 2006 but joined the common vocabulary of the global cyber community in 2010, when Google [...]