National insurance firm Crum and Forster is offering a professional liability program for CISOs who are facing growing ...
Augmented reality use cases have become prevalent in our society. The technology, which first emerged primarily in the world ...
Discover the 5 best vendor risk management solutions, designed to help you mitigate third-party risks while ensuring ...
I didn’t see much visibility on this DocuSign hack. This is a situation where the product features were not vetted to ...
Flare recently hosted our first Threat Intel Workshop with Senior Threat Intelligence Researcher Tammy Harper. Below are some of the questions Tammy covered in improving threat intelligence collection ...
API attacks can be costly. Really costly. Obvious financial impacts like legal fines, stolen finances, and incident response budgets can run into the hundreds of millions. However, other hidden costs ...
In episode 354, we discuss the emergence of the term ‘Advanced Persistent Teenagers’ (APT) as a “new” cybersecurity threat. Recorded just before the election, the hosts humorously predict election ...
Deployment of 5G and AI-enhanced IoT systems is accelerating. This, in turn, is driving up the number of IoT-connected ...
Your internet account passwords are probably among the most guarded pieces of information you retain in your brain. With ...
The Tennessee Information Protection Act (TIPA), effective July 1, 2025, is a state-level data privacy law that regulates how companies manage and protect consumers’ personal data within Tennessee. ...
The Delaware Personal Data Privacy Act (DPDPA) is a state law created to protect the privacy of Delaware residents by regulating the collection, use, storage, and sharing of personal data by ...
ISPs face a few unique challenges and risks when it comes to DDoS attacks. Their size and complexity make them bigger targets for hackers, while their unique structural features require more tailored ...