SOC Automation Playbook

Identity and Access Management: Industry Driven View

Protecting Privileged Access in DevOps and Cloud Environments

Ponemon: Key Findings for FIs from "AppSec in the DevOps Environment" Study

Beating the Bad Guys: Safe and Secure Transactions in the IVR

Critical Capabilities for IT Vendor Risk Management Tools

5 Tips How to Move to DevSecOps (French Version)

Polymorphic Phishing Attacks - 5 Insights to Stop Them

Cofense Quarterly Phishing Review: July - September 2020

Phish Are Getting to Your Inbox: Why Your 'Secure' Email Gateway Isn't

An Integrated Approach to Embedding Security into DevOps

Tips how to Move to DevSecOps with Ease

Cybersecurity: The Human Challenge

Managed Detection and Response (MDR) Services Buyers Guide

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.