code

Review: ThreadFix 3.0

Maintaining a strong organizational security posture is a demanding task.
Most best practices – e.g. CIS Controls, the OWASP Vulnerability Management Guide – advocate a continuous program of asset discovery and vulnerability management. Due to fundamen…

Improving IT security by deception

Having a deception and denial defence strategy buys your security team time to respond and shut down an attack.

Cybercriminals have access to a broad range of tools and techniques, but they tend to share one common goal – they’re looking to make the…