Shrink the DNS attack surface with Auth-DoH Imagine you could keep your building location private by making employees invisible as they traveled from home to office. […]
Network telemetry is a reservoir of data that, if tapped, can shed light on users’ behavioral patterns, weak spots in security, potentially malicious tools installed in […]
Part 2: Industry trends In our Threat Trends blog series, we attempt to provide insight into the prevalent trends on the threat landscape. Our goal in […]