To shine a light on the importance of proactively monitoring your company’s Certificate Inventory, we’ve compiled a list of high-profile companies whose oversights have led to website downtime and financial losses…Continue Reading: A real-world view: How expired certificates can cause service downtime and financial losses
Domain Protection
What is Typosquatting? Everything you need to know and how to prevent it
A social engineering tactic that targets internet users who unintentionally type incorrect URLs into their web browsers, we discuss how best to protect against the threat…Continue Reading: What is Typosquatting? Everything you need to know and how to prevent it
The Data Must Flow (Part 2)
We take a serious look at new privacy regulations, data frameworks, and the return on investment for cybersecurity compliance…Continue Reading: The Data Must Flow (Part 2)
The data must flow (Part 1)
Today, cybersecurity concerns touch most every aspect of business operations as companies and governments have deployed substantial digital assets and vulnerabilities abound…Continue Reading: The data must flow (Part 1)
Why we’ve acquired Hardenize, and what this means for our customers
Today, I’m delighted to announce that Red Sift has acquired global Attack Surface Management (ASM) innovator, Hardenize. This is one of the most significant moves in Red Sift’s history to date, and means we can now enrich and extend our leading security products…Continue Reading: Why we’ve acquired Hardenize, and what this means for our customers
3 ways the Digital Operational Resilience Act relates to email and domain security
To comply with DORA, businesses must make provisions in all areas of their business. But a key area that shouldn’t be overlooked is email and domain security, or rather how businesses look to mitigate threats relating to this…Continue Reading: 3 ways the Digital Operational Resilience Act relates to email and domain security