Data Leakage

SolarWinds Compromise: What security teams need to know
December 14, 2020 | 5 Min Read

SearchLight’s Exposed Document Alerts: Uncover the Critical, Faster
November 23, 2020 | 5 Min Read

Cybersecurity Awareness Month: Week 2 – Security Devices at Home and Work
October 14, 2020 | 7 Min Read

Clickbait to Checkmate: SMS-based scam targets US smartphones and accesses victim locations
October 13, 2020 | 11 Min Read

Help your development teams keep their keys safe
October 7, 2020 | 3 Min Read

Four Ways to Validate Credentials in SearchLight
September 29, 2020 | 3 Min Read

Access Keys Exposed: More Than 40% Are For Database Stores
September 14, 2020 | 6 Min Read

Validate Exposed Credentials with Okta to Save Even More Time
August 24, 2020 | 3 Min Read

Account takeover: Expanding on impact
July 27, 2020 | 7 Min Read

SearchLight’s Credential Validation: Only Focus on What Matters
July 14, 2020 | 4 Min Read

Modern Software Development and DevSecOps: Despite security controls, data leaks persist
June 22, 2020 | 15 Min Read

Reducing technical leakage: Detecting software exposure from the outside-in
June 16, 2020 | 6 Min Read

The 2020 Verizon Data Breach Investigations Report: One CISO’s View
May 19, 2020 | 6 Min Read

A NEW DECADE OF CYBER THREATS: LOOKING BACK AT THE TRENDING CYBER TOPICS OF Q1 2020
May 14, 2020 | 10 Min Read

How to minimize cybersecurity breaches in 2020
April 8, 2020 | 9 Min Read

COVID-19: Third-party risks to businesses
March 31, 2020 | 5 Min Read

Threat Model of a Remote Worker
March 25, 2020 | 7 Min Read

Want to Control Your Ever-Changing Perimeter? Focus on Integrations.
March 4, 2020 | 5 Min Read

How Digital Shadows Helped Find and Remediate an Exposed Admin Password on Github
January 23, 2020 | 5 Min Read

Third Party Risk: 4 ways to manage your security ecosystem
January 16, 2020 | 5 Min Read