Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is Password Salting and How It Keeps Your Information Secure

How much thought goes into your passwords? Most internet users today know that they need strong, complex, multi-value characters in their access codes. Fewer understand how their password interacts with the cybersecurity of a hosting platform or website. As far as personal cybersecurity is concerned, the longer a password is, the better the personal protection; however, having a strong password is only half of the story.

Zero Trust vs Traditional Security Models: What's the Difference?

As cyber attacks grow in sophistication, traditional security models become more vulnerable, prompting many organizations to adopt zero-trust security. The main difference between traditional and zero-trust security models is how they approach access control. Traditional security models assume trust for users inside their networks, whereas zero-trust security verifies every user and device by default, requiring continuous authentication.

How to Prevent a Subdomain Takeover in Your Organization

When was the last time you checked DNS configurations for subdomains pointing at services not in use? According to Crowdsource ethical hacker Thomas Chauchefoin, while expired and forgotten subdomains can easily become an entry point for an attacker to steal sensitive data and launch phishing campaigns, having the right tool in place can keep them at bay.

Understanding the EU's Cyber Resilience Act (CRA)

The Cyber Resilience Act (CRA) introduces a much-needed framework for standardizing the cybersecurity practices of companies operating in the European Union (EU). The regulation sets clear expectations for hardware and software manufacturers, developers, and distributors, outlining how they should manage and address vulnerabilities at every stage of the product lifecycle.

Trustwave SpiderLabs 2025 Trustwave Risk Radar Report: Energy and Utilities Sector

The energy sector plays a crucial role in national security by ensuring the delivery of essential infrastructure services and supporting transportation systems. Acknowledging the need to safeguard this vital industry, Trustwave SpiderLabs has published the highly detailed 2025 Trustwave Risk Radar Report: Energy and Utilities Sector. The primary report is joined by two specialized supporting pieces of research focusing on these critical areas of concern.

Trustwave SpiderLabs: Ransomware Attacks Against the Energy and Utilities Sector Up 80%

The energy sector is a cornerstone of national security, ensuring the delivery of critical infrastructure services and supporting transportation systems. Recognizing the importance of protecting this vital industry, Trustwave SpiderLabs has released the comprehensive 2025 Trustwave Risk Radar Report: Energy and Utilities Sector.

11:11 Systems Receives Prestigious 2024 Zero Trust Security Excellence Award

The Greek philosopher Aristotle once remarked, “Excellence is never an accident. It is always the result of high intention, sincere effort, and intelligent execution.” When you’re winning, the thrill is undeniable. Success, whether in the casino or on the basketball court, requires focus and discipline. It’s a feeling like no other when everything finally clicks.

Stop Demonizing CVSS: Fix the Real Problem

If you read the newest risk-based vulnerability management literature, it appears we have a new favorite punching bag: the Common Vulnerability Scoring System (CVSS). You seemingly can’t throw a rock into the “vuln-o-sphere” without hitting someone dunking on CVSS or the National Vulnerability Database (NVD). The argument goes something like this: “Exploitation rates are up, ransomware is surging, and vulnerabilities are multiplying like rabbits.