Data Bouncing: How HTTP Headers Leak Data

Data Bouncing: How HTTP Headers Leak Data

Data Bouncing: How HTTP Headers Leak Data Find Threat Talks on Data Bouncing: How HTTP Headers Leak Data You harden endpoints. You filter egress. You deploy malware detectors. And still, data slips out. In this Threat Talks Deep Dive, our host sits down with Luca...
Zero Trust Step 5A: Monitor and Maintain

Zero Trust Step 5A: Monitor and Maintain

Zero Trust Step 5A: Monitor and Maintain Find Threat Talks on Zero Trust step 5A: Monitor and Maintain Monitoring is often treated as an afterthought in cybersecurity, or worse, as a starting point. But without the right foundation, all those logs, alerts and SIEM...
SignalGate: Wrong Contact, Classified Chat Leak

SignalGate: Wrong Contact, Classified Chat Leak

SignalGate: Wrong Contact, Classified Chat Leak Find Threat Talks on SignalGate: Wrong Contact, Classified Chat Leak When a group of U.S. government and military officials chose Signal to share classified information, they assumed it was a secure choice. But one...