Ryvlar Insights
From the Front Lines of Cybersecurity.Actionable intelligence and expert analysis on the latest threats, vulnerabilities, and adversary techniques.
Featured Article
Question: What do the following industries have in common — Aerospace, Aviation, Energy, Healthcare, Pharmaceutical, Technology, Law Practices, Oil, Precious Metal Mining, Defense, Government Officials, Military Officials, NATO, Embassies, Education & Research, Large Enterprises, and Large Brands? Answer: They have all been targets of active cyber-espionage (APT) groups.
Dark Reading
Open originalQuick reads
Attack Surface Management
Securing Your Software Supply Chain
A practical starting point for implementing secure software development practices across suppliers and internal teams.
Open originalThreat Intelligence
Anatomy of a Ransomware Attack
A real-world walk-through of tactics, techniques, and procedures observed in a modern ransomware incident.
Open originalAttack Surface Management
A practical starting point for implementing secure software development practices across suppliers and internal teams.
Open originalThreat Intelligence
A real-world walk-through of tactics, techniques, and procedures observed in a modern ransomware incident.
Open originalBreach Monitoring
How stolen logins are packaged, priced, and traded at scale—and why credential theft drives so many breaches.
Open originalExecutive Viewpoint
Director-level guidance for framing cyber risk, metrics, and investment decisions with your board.
Open original