An Intellyx Brain Candy Brief Everybody hates virtual private networks (VPNs). They’re difficult to use, flaky, and they provide limited, binary access to internal network…
An Intellyx Brain Candy Brief Unlike malware-based attacks, a business logic attack seeks to subvert the normal behavior of a web site or mobile app.…
An Intellyx Brain Candy Brief HYPR complements traditional biometric multifactor authentication (MFA) on mobile devices with public key cryptography (PKI) by storing keys and credentials…
An Intellyx Brain Candy Brief To fight the problem of drug counterfeiting, regulations now require pharmaceutical companies to provide tamperproof packaging that enables everyone in…
An Intellyx Brain Candy Brief Because of their inherently ephemeral, dynamic nature, containers require a new approach to cybersecurity. Manual policies, static IP addresses, and…
An Intellyx Brain Candy Brief Cavirin uses machine learning to analyze how secure and compliant an organization’s hybrid cloud environment is, and combines those two…
An Intellyx Brain Candy Brief The storied history of Unisys dates to an adding machine company founded in 1884 and the UNIVAC digital computer from…
An Intellyx Brain Candy Brief Unlike API gateways and most other API security technologies, Salt Security doesn’t install in the path of traffic and doesn’t…
An Intellyx Brain Candy Brief Whenever I run into a log analysis startup, the first question I always ask is how they compete with Splunk.…
An Intellyx Brain Candy Brief Lastline leverages AI, machine learning (ML) in particular, to identify malicious behavior on networks, both on premises and in the…