Understanding MITRE’s 2020 ATT&CK Evaluation

If you want to protect a cybersecurity asset, you need to understand how someone is likely to attack it. One person or organization, however, can only learn so much on its own. Yet when [...]

Why Identity and Access Management is the New Public Cloud Perimeter

Identity and Access Management (IAM) has become a key security battleground for attackers and defenders. Unfortunately, many defenders not only lack the expertise to fight this battle, but they [...]

How Advanced Persistent Threats Work

The term Advanced Persistent Threat, or APT, was apparently first coined at the United States Air Force in 2006 but joined the common vocabulary of the global cyber community in 2010, when Google [...]