During the past few months, as the COVID-19 pandemic has spread around the globe, we’ve witnessed a global rise in identity and phishing attacks. But identity-related breaches don’t just happen during a time of crisis; they are prevalent, unfortunately, even in the best of times.
To better understand the identity-related security landscape, the…
By now the whole world has heard that Jeff Bezos’s WhatsApp was hacked, leading to the theft, or exfiltration, of gigabytes of personal data. We don’t know what data the hackers stole, as the attackers, once finished with their operation, quickly deleted their tracks, destroying almost all of the tell-tale signs that they breached the phone. In…
Every development team must decide which components to build in-house and which to offload to a 3rd party vendor. This decision is often difficult and hotly debated. After all, most developers chose this career in order to build cool things! Choosing to relinquish that control to buy a solution can seem contrary to their raison d’etre. But…