White Paper for Tanium by Jason Bloomberg Cybersecurity and reliability risks cannot be managed by working in silos, although operations and security teams have historically…
An Intellyx Analyst Guide for Approov by Jason Bloomberg and Eric Newcomer, Intellyx High-level Mobile apps are now the center of your business strategy –…
An Intellyx Brain Candy Brief When a human accesses a secure service, they provide a secret – typically a password or a biometric indicator like…
An Intellyx Brain Candy Update Since we last covered RAD Security in April 2023 (when the company was called KSOC), more than the name has…
Article for IT Brief Asia by Katherine Knowles A Geo Desync Attack involves creating mismatches in location data on a mobile device. This manipulation of…
Comcast’s DataBee ingests security and logging data into cloud native data lakes such as Snowflake and Databricks to provide security and compliance insights for an…
An Intellyx Brain Candy Update Since we last covered Torq in April 2023, the company has extended its Security Orchestration, Automation, and Response (SOAR) replacement…
Article by Eric Newcomer for The New Stack Interesting topics at this year’s RSA Conference included AI (of course), quantum cryptography, network defense, second line…
An Intellyx Brain Candy Brief Legit Security provides application security posture management and software supply chain security for appsec and DevSecOps teams. The platform helps…
An Intellyx Brain Candy Brief Dragos provides a cybersecurity threat detection platform for operational systems such as those that automate factories, data centers, and mines. …


