XZ Compression Backdoor, Linux Distros and Supply Chain Attack
- Mar 21
- 2 min
CISA Breach, Security Software and Proactive Attack Surface Management
- Mar 8
- 2 min
Navigating Cybersecurity in Mergers and Acquisitions: A Holistic Approach
- Feb 7
- 2 min
Why Can't We Get MFA Right? Lessons from Recent SEC and Microsoft Incidents
- Jan 23
- 2 min
Google Flights vs. Google Ad: The Battle of Ad Squatting Attacks
- Jan 16
- 2 min
The Hidden Risks in Security Software: Lessons from the Boeing Ransomware Attack
- Dec 12, 2023
- 2 min
Enhancing Industrial Control System Security: Insights from CISA's Latest Advisories
- Dec 5, 2023
- 4 min
Preparing for DORA Compliance: Strengthening ICT Supplier Risk Management in Finance
- Nov 27, 2023
- 2 min
Strengthening Supply Chain Defenses Against Ransomware: Insights from Xplain and Concevis Incidents
- Nov 21, 2023
- 4 min
Harnessing C2SEC's XSPM to Empower Gartner's CTEM Framework
- Nov 14, 2023
- 2 min
Navigating the Shift Away from Third-Party Cookies with C2SEC XSPM
- Nov 8, 2023
- 2 min
Maximizing Efficiency: How C2SEC Empowers Cost Optimization in Cloud Operations
- Oct 17, 2023
- 2 min
The Hidden Risks of Third-Party App Consents in Microsoft 365
- Oct 4, 2023
- 2 min
Introducing XSPM: Redefining the Paradigm in Attack Surface and Security Posture Management!
- Apr 14, 2021
- 2 min
The Back to Basics Approach: Security
- Feb 3, 2021
- 2 min
Security software is still software
- Feb 2, 2021
- 2 min
Enable trust in the digital interconnected world