The newest tools in the terrorist toolbox: cyberattacks and cyberwarfare

When we think about America’s adversaries in cyberspace, we think of large, near-peer nation-states with sophisticated militaries’ incredibly capable cyberwarriors at their disposal. We think of countries like Russia, China, and North Korea. But the threat against America extends beyond…

Compromised Credentials Monitoring: The Flashpoint Advantage

Flashpoint Compromised Credentials Monitoring (CCM) allows users to monitor exposure of compromised credentials for their employee and customer email addresses to take action after breaches to mitigate risk of account takeover (ATO). First to Access Fresh Breach Data: Ability to…

Just how vulnerable is the 2020 election to outside interference?

Editor’s Note: The 2020 election is set, with both tickets identified and candidates preparing to accept their parties’ nominations at their national conventions in the coming weeks. Those national conventions will look and feel very different from years past, when…