RED SIFT BLOG
Resilience Rising podcast series: Greg Touhill
Summary Join Dr. Sean Costigan and Dr. Rois Ni Thuama from Red Sift as they converse with Gregory Touhill, the first Chief Information Security Officer (CISO) of the US Government and a distinguished cybersecurity expert. In this insightful episode, Touhill shares his wealth of experience from leading the Software Engineering Institute’s (SEI’s) CERT division, serving...Continue Reading: Resilience Rising podcast series: Greg Touhill
How to Identify and Prevent Supply Chain Attacks?
With the increasing reliance on complex supply chains that span across various vendors and service providers, these supply chain cyber threats have become a genuine concern in the cybersecurity space and require a more proactive approach to mitigate these risks. ...Continue Reading: How to Identify and Prevent Supply Chain Attacks?
Announcing Cloud Integrations: The Next Big Leap in Attack Surface Management
We'r thrilled to announce new cloud integrations in Hardenize. This new capability provides complete visibility into assets in AWS, Google Cloud and Azure, so security teams have a more holistic view of the entire attack surface...Continue Reading: Announcing Cloud Integrations: The Next Big Leap in Attack Surface Management
What’s the difference between SMTP, IMAP, and POP3 email protocols?
Emails are an inevitable part of today’s corporate and personal life. But do you know what mechanisms a standard mail exchange process follows? Well, multiple elements are included, like email protocols, email service providers, mail user agents (MUAs), message submission agents (MSAs), mail delivery agents (MDAs), etc. ...Continue Reading: What’s the difference between SMTP, IMAP, and POP3 email protocols?