Infrastructure & Endpoint Security
Are most of the CAPTCHAs we see today are even trying to block automation? The only users CAPTCHAs are stopping are the elderly, visually challenged, people on low-end devices, users with shaky connectivity, and non-native language speakers.
Theoretically, it is a simple choice. It is preferable to opt for full SASE over…
Endpoints remain a perennially favorite vector for many types of cyberattacks. Hence, endpoint monitoring and…
The Zero Trust Network Security (ZTNS) software is an essential part of almost all security…
In battles, innovation matters. The Mongol cavalry, led by Genghis Khan, was highly effective because…
Endpoints remain a popular attack vector. Factors like the proliferation of IoT devices and trends…
Application, Data & Identity Protection
If you want total security, go to prison. There you’re fed, clothed, given medical care and so…
IT infrastructure has evolved over time from a 3-tier structure to a desegregated stack that…
The comparison of the Q4 2024 and Q3 2025 SPARK MatrixTM for the Web Application…
The number of incidents involving stolen credentials in 2025 is, to quote an ancient meme,…
While we may think ransomware is a 20th-century phenomenon, it has existed in its most…
Are most of the CAPTCHAs we see today are even trying to block automation? The only users CAPTCHAs are stopping are the elderly, visually challenged, people on low-end devices, users with shaky connectivity, and non-native language speakers.
Monitoring, Response & Threat Intelligence
The Managed Detection and Response (MDR) services are witnessing increasing year-on-year growth because of powerful…
Threat intelligence is a vital part of organizational security. It allows organizations to move from…
Most of us will have spotted the pun in the heading from a mile away,…
As the threat landscape keeps evolving, the tools to tackle the varieties of threats are…
Even as newer trends like you-know-what continue to shake up the security landscape, the need…
Governance, Risk & Human-Centric Security
In battles, innovation matters. The Mongol cavalry, led by Genghis Khan, was highly effective because…
To paraphrase Mark Twain, the reports of the impending death of SD-WAN following the rise…
Technology is a funny thing. It can create and destroy. The starkest example of this…
Privileged Access is a double-edged sword. In the right hands, they are useful for modern…
I have a theory about the widespread adoption of the agile methodology. It allows companies…
Security teams across the world are battling severe crises, including personnel shortage and burnout. In…