Blog
Customizing Security with Security Configuration Management (SCM)
By Michael Betti on Thu, 02/22/2024
Blog
The Dangers of Default: Cybersecurity in the Age of Intent-Based Configuration
By Faisal Parkar on Tue, 02/06/2024
Blog
Security Risks of Kubernetes Helm Charts and What to do About Them
By Gilad David Maayan on Tue, 02/06/2024
Blog
Resolving Top Security Misconfigurations: What you need to know
By Jeff Moline on Mon, 01/22/2024
Blog
Critical flaw found in WordPress plugin used on over 300,000 websites
By Graham Cluley on Mon, 01/15/2024
Blog
The Evolution of Anomaly Detection and the Importance of Configuration Monitoring in Cybersecurity
By Anirudh Chand on Wed, 01/10/2024
Blog
The History of Patch Tuesday: Looking back at the first 20 years
By Tyler Reguly on Tue, 12/19/2023
Blog
Guarding the Grid: Navigating the Current and Future Landscape of Utility Cybersecurity
By Travis Emerson on Mon, 11/27/2023
Blog
SMB Protocol Explained: Understanding its Security Risks and Best Practices
By Dilki Rathnayake on Tue, 11/21/2023