<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2092100&amp;fmt=gif">
    Browse by topic
    Subscribe to our news

    Insider

    The Importance of Attack Surface Management

    For today’s businesses, the same technology that gives customers access and employees flexibility can also introduce threats to information systems and data. As these technologies evolve and their usage increases across an enterprise, their attack ...
    Read

    Insider

    Effective Strategies to Mitigate Cybersecurity Risks to AI

    Artificial intelligence (AI) is changing the way that employees work, how companies think about technology, and how businesses process and utilize information. However, given these systems’ need for connectivity and constant access to data, they can ...
    Read

    Insider

    How to Choose the Right Zero Trust Solutions

    Yesterday’s cybersecurity methods were designed for a different time, failing to combat an evolving threat landscape. But this doesn’t mean organizations have to be vulnerable, either. Zero Trust solutions offer a modern take on protecting your ...
    Read

    Insider

    AI and Cybersecurity Infrastructure Risks and Shortcomings

    Once a technology reserved for select research labs, artificial intelligence (AI) has quickly become integral to many businesses' operations. Although this rapid integration has brought with it many exciting opportunities and advantages, the ...
    Read

    Insider

    Zero Trust is Boring (and Why That's a Good Thing)

    When you hear the word "cybersecurity," what comes to mind? For many people, including myself, it conjures up images similar to the intense, high-stakes world portrayed in the American TV series, 24. In this show, a team of counter-terrorism experts ...
    Read

    Insider

    How To Prevent Software Supply Chain Attacks

    A new NIST specification promises to help software vendors avoid becoming conduits for advanced cyberattacks on their customers - and Zero Trust is part of the solution. The Infosec world was on fire again last week, and this time, the focus was on ...
    Read

    Insider

    Zero Trust Unveiled: 5 Common Myths

    Zero Trust is one of the most frequently discussed topics in cybersecurity, but it’s also one of the most misunderstood. It’s not because there’s not enough information out there - on the contrary, there is way too much written about Zero Trust! The ...
    Read

    Insider

    CoIP Platform Version 8.2.1 is Now Available

    Our latest release, 8.2.1, has reached GA and available for download!
    Read

    Insider

    Navigating AI Cybersecurity Challenges

    Artificial intelligence (AI) exploded on the scene last summer with the launch of text-to-image AI like Stable Diffusion, and large language models, like GPT-3 from OpenAI. GPT-3 (which has already been succeeded by GPT-4) came into its own in ...
    Read

    Insider

    How the Secret Service Handles Zero Trust

    There's a popular phrase among devotees of the Perl programming language: "There's More Than One Way To Do It." (TMTOWTDI) This phrase neatly captures the ethos of Perl, which is to free programmers from the confines of syntaxes and algorithms, ...
    Read

    Stay Connected

    Sign up for our newsletter and to be notified of product, solution, and company news.