Email threats continue to persist as one of the most common infection vectors. Demonstrating the prevalence of email inbox targeting, Verizon's 2019 Data Breach Investig…

   14   2020-01-20   0 Read More

The HTTP response headers that allow us to configure and deploy security features on our site. There are headers like Content Security Policy, Strict Transport Security,…

   37   2020-01-13   0 Read More

The IT technologies are changing from closed on premise infrastructure to cloud platform. Security is no longer segregated trusted zone but more zero trust approach. Wha…

   23   2019-07-17   0 Read More