hand on keyboard in dark setting
How Hacking Works. And How Software-Defined Perimeter Fights Back.

Hackers rarely take on your firewall directly, dramatically punching a series of keys looking at screens of code in a dark room. It makes for a great movie scene—but the reality isn’t as sexy. I sat down with expert hacker,…

Keep Reading
Who’s holding you hostage: Cybersecurity companies or hackers?

It’s a serious headline. Although most CISOs, CIOs, and CTOs teams have the best intentions taking proactive steps to prevent a data breach and ward off hacking intrusions, many are stunned when they discover their security response retainer didn’t actually…

Keep Reading