Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Risk Mitigation and Cybersecurity Strategy with Samuel Brown | Secrets of AppSec Champions Podcast

As cyber threats evolve, so must the strategies to prevent them. In this episode, Samuel Brown—CEO of PacketX and retired U.S. Army CW4—shares mission-critical insights on risk mitigation, layered security, and why backups and plans on paper aren't enough. From ransomware recovery to real-world network defense, this conversation is packed with hard-earned lessons for AppSec professionals and business leaders alike.

Best Practices for Aggregating and Normalizing Exposure Data

In our first article exploring vulnerability management vs. exposure management, we explored the growing recognition that exposure management is not just a rebranding of vulnerability management. Rather, it’s a strategic evolution. Where traditional vulnerability management often focuses narrowly on CVEs and technical severity, exposure management demands a broader, more integrated understanding of risk across assets, environments, and attack vectors.

Why Security Teams Must Rethink Incident Response for Identity Attacks

Blocking a CEO's account to stop an anomaly? It might stop your business too. When implementing Identity Threat Detection and Response (ITDR), security teams must balance robust protection and business continuity. In this clip, our expert explains why blindly blocking access can cause more damage and how identity-proofing methods, like 2FA and push notifications, offer a smarter approach. Rethink your strategy to keep security seamless.

Day in the life of an SOC leader

A security operations center (SOC) leader is the point person for an organization’s security operations. They run a team of security analysts, engineers, and other specialists. But what exactly do they do on a day-to-day basis? As the person managing the organization’s cybersecurity hub, the SOC leader has to navigate all the complexities that come with it.

Different Types of Malware Explained

The internet isn’t always a safe place. Behind every click, every download, and every flashy pop-up ad, there might be something lurking that could bring down entire systems or steal sensitive information. That “something” goes by a name we’ve all heard: malware. But while the word gets used a lot, how many of us really know what it means? Or better yet, how many of us understand the different ways malware can mess with our data, our privacy, or even our businesses?