TAG Cyber
Dangerous misconceptions about emerging cyber threats
Organizations are leaving common attack paths exposed in their quest to combat emergent threats, according to Cymulate. The most concerning cyber threats The report delves …
TAG Cyber opens headquarters in New York to support RaaS platform development
TAG Cyber announced that it is opening its new world headquarters in the Battery Park section of Manhattan at 45 Broadway. The new office will support TAG Cyber’s Research as …
Attivo Networks ThreatStrike functionality helps hide real credentials from attacker tools
Attivo Networks announced a new way of protecting credentials from theft and misuse. As part of its Endpoint Detection Net (EDN) Suite, the ThreatStrike functionality allows …
BehavioSec extends its behavioral biometrics platform into a SOC/ISO compliant SaaS version
BehavioSec announced that it has extended its patented technology and BehavioSense platform into a SOC/ISO compliant, hosted-version and a cloud-native, SaaS version. These …
Marios Damianides joins TrueFort Advisory Board
TrueFort announced that Marios Damianides, former Consulting Partner and Northeast Region Cybersecurity Leader at Ernst & Young, has joined the TrueFort Advisory Board …
ThreatQuotient launches ThreatQ TDR Orchestrator to accelerate detection and response
ThreatQuotient announced ThreatQ TDR Orchestrator, a new data-driven automation capability for more efficient and effective threat detection and response. This capability …
TAG Cyber highlights the need for Software Bill of Materials (SBOM)
The security research and advisory team at TAG Cyber has published a new article in its TAG Cyber Security Quarterly that makes the point that software bill of materials …
Understanding cyber threats to APIs
This is the fourth of a series of articles that introduces and explains API security threats, challenges, and solutions for participants in software development, operations, …
Factors driving API growth in industry
This is third in a series of articles that introduces and explains application programming interfaces (API) security threats, challenges, and solutions for participants in …
Growth of APIs for new services
This is the second of a series of articles that introduces and explains API security threats, challenges, and solutions for participants in software development, operations, …
Understanding the basics of API security
This is the first of a series of articles that introduces and explains application programming interfaces (API) security threats, challenges, and solutions for participants in …
Client-side web security
To address attacks such as XSS, Magecart and other card skimming exploits found in modern eCommerce environments, the use of client-side web security methods is beginning to …