Jacob Garrison
Three Ways to Enhance Your Cloud Security with External Attack Surface Management
The massive increase in cloud adoption has driven adversaries to focus their efforts on cloud environments — a shift that led to cloud intrusions increasing by 75% in 2023, emphasizing the need for st[…]
Hiding in Plain Sight: Remediating “Hidden” Malware with Real Time Response
As organizations move more of their business-critical applications to the cloud, adversaries are shifting their tactics accordingly. And within the cloud, it’s clear that cybercriminals are setting th[…]
Architecture Drift: What It Is and How It Leads to Breaches
Cybercriminals work around the clock to discover new tactics to breach systems. Each time a digital ecosystem changes, it can introduce a weakness for a threat actor to quickly discover and exploit. A[…]
3 Critical Steps for Application Security Teams in 2024
Software development practices are rapidly changing, and so are the methods adversaries use to target custom applications. The rise of loosely coupled applications, along with an impressive increase i[…]
The Difference Between Securing Custom-Developed vs. Commercial Off-the-Shelf Software
Modern applications are designed to process, use and store vast amounts of sensitive data. As adversaries seek to infiltrate these applications, IT and security teams must ensure the software they use[…]