Blog

Proactive Cloud Workload Security Strategy 

Brad LaPorte | 29 Jul 2025

You Can’t Recover What You Never Captured: Why Forensic Recovery Is Central to Cyber Resilience

Adaptive Exposure Management
Fileless Malware
Preemptive Security
Ransomware

Brad LaPorte | 28 Jul 2025

Automated Moving Target Defense Research Guide

Automated Moving Target Defense

Brad LaPorte | 10 Jul 2025

Why Endpoint Security Needs a Rethink: From Reactive to Preemptive Defense 

Preemptive Security

FEATURED BLOGS

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Brad LaPorte | 04 Jun 2025

Use Preemptive Cyber Defense to Stop Ransomware and GenAI-Driven Attacks Before They Start 

Artificial Intelligence
Gartner
Preemptive Security

Brad LaPorte | 13 Mar 2025

Encryption, AI Risks and Policy Chaos: What’s Next for Cybersecurity? 

Artificial Intelligence

Brad LaPorte | 21 Feb 2025

Navigating Cyber Threats in 2025: Insights from Industry Leaders 

Advanced Threat Defense
Artificial Intelligence
Threat and Vulnerability Management

Brad LaPorte | 17 Feb 2025

Wild, Weird, and Probable: 13 Cybersecurity Predictions for 2025 

Artificial Intelligence
Continuous Threat Exposure Management (CTEM)
Ransomware
Threat and Vulnerability Management

Brad LaPorte | 07 Nov 2024

Spy or Ally: Unpacking the Cybersecurity Risks of AI Agent-based Systems

Adaptive Exposure Management
Artificial Intelligence

Brad LaPorte | 24 Sep 2024

How AI-Enabled Capabilities are Transforming Cybersecurity

Artificial Intelligence

Nir Givol | 27 Jul 2023

Outsmarting Generative-AI Attacks: The Power of Automated Moving Target Defense

Artificial Intelligence
Automated Moving Target Defense

Oren Dvoskin | 25 Jan 2023

Will ChatGPT Create Super Malware?

Artificial Intelligence
Automated Moving Target Defense