Articles, News and Industry Tips

Read the latest articles on best practices, building customer-centric products, and the latest in cybersecurity.
Filters
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Cloud Security
CIS Controls v8 Explained: 18 Controls Every Organization Needs

April 10, 2026

Cloud Security
Cloud-Native Services Threat Modeling: STRIDE Framework, Controls & Automation

April 9, 2026

Software Supply Chain Security
Axios NPM Supply Chain Attack: Technical Analysis, IOCs, Detection & Mitigation

April 8, 2026

Cloud Security
MCSB Deep Dive: Securing Azure with Microsoft Cloud Security Benchmark

April 6, 2026

Vulnerability Management
Vulnerability Management Tools and Process: A Practitioner's Guide to Staying Ahead of Threats

April 6, 2026

Threat Integrations
Wiz Cloud Security: Everything You Need to Know About the Platform Securing the Modern Cloud

April 3, 2026

Cloud Security
Security Controls in Cybersecurity: A Complete Guide to MCSB, CIS, and NIST Frameworks

March 24, 2026

Artificial Intelligence (AI)
MCP vs API: What's the Actual Difference and When to Use Each

March 23, 2026

Cloud Security
Infrastructure Intelligence in Cybersecurity: Detect Threats Before They Launch

February 24, 2026

Information Security
Microsoft Purview for Data Governance, Compliance & Risk Management

February 23, 2026

Artificial Intelligence (AI)
Claude Opus 4.6 Discovers 500+ Critical Vulnerabilities in Open-Source Software: What This Means for Cybersecurity

February 10, 2026

Threat Integrations
The Hidden Tax on Cybersecurity Integrations: Why Security Product Integrations Are Harder Than They Should Be and How Loginsoft Helps

January 19, 2026

Subscribe to our Newsletter