Posts

Checkpoint On The WhatsApp Hack

/
The recent news about the WhatsApp hack showcases that even the…

Protecting Your API With JWTs

/
Securing your API doesn't have to be difficult, but it does usually…

What Is Splunk - A Deep Dive

/
Splunk is not a tool, it is a platform on which tools are built.…

Avoiding Phishing Emails

/
I read this morning that Taos Public Schools were hit with a…

How DNS Tunneling Can Be Abused

/
I stumbled on this excellent technical explanation of a relatively…

The Rise of Sensor-Based Security Products

/
When I talk about sensor-based products, what I’m specifically…

Tenable Wins Best Vulnerability Management Solution at 2019 SCAwards

/
As an account manager, it is important to me that the solutions…

Using Tenable To Identify Network Vulnerabilities

/
One of the key areas we can automate our defensive posture is…

Protecting The API Ecosystem As A Security Strategy

/
Cybersecurity is an ever-increasing and advancing arms race.…

Testing APIs with Rest

/
APIs (Application Programming Interface) have become an increasingly…