top of page


How to Prioritize Vulnerabilities in Your Supply Chain: A Proven Approach to Cut Through the Noise of TPRM
How to Prioritize Vulnerabilities in Your Supply Chain: A Proven Approach to Cut Through the Noise
Heighten CORE Member
May 222 min read


Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension
Polymorphic Extensions: The Sneaky Extension That Can Impersonate Any Browser Extension
Heighten CORE Member
Mar 182 min read


Your career, elevated: Meet Mishal!
Welcome back to our monthly blog series called Your Career, Elevated! Join us as we sit down with team members from various departments...
PR Team
Feb 133 min read


Why Shadow AI is a blind spot in your security and how to help mitigate the risk
Why Shadow AI is a blind spot in your security and how to help mitigate the risk
Heighten CORE Member
Feb 52 min read


Think Like a Hacker for Successful Third-Party Risk Management (TPRM)
Written by: Candan Bolukbas , CTO and Founder Contributor: Ferhat Dikbiyik , Chief Research and Intelligence Officer As Sun Tzu said...
Heighten CORE Member
Oct 30, 20244 min read


Five Things Every SOC Should Know About Today’s Hybrid Cyber Attackers
Five Things Every SOC Should Know About Today’s Hybrid Cyber Attackers
Vectra AI
Apr 16, 20245 min read


Your career, elevated: Meet Pat!
Our monthly Meet the Team blog series, called Your Career, Elevated.
PR Team
Feb 26, 20243 min read


Navigating Recent Vulnerabilities in Ivanti Connect Secure
Navigating Recent Vulnerabilities in Ivanti Connect Secure
Heighten CORE Member
Feb 12, 20243 min read


Fortinet Remote Access Trojan and February Vulnerability Announcement
Fortinet has issued a warning about the importance of patching critical vulnerabilities in edge network appliances. This coincides...
Heighten CORE Member
Feb 8, 20243 min read


Your career, elevated: Meet Cata!
Get to know the Heighten Security team through a series of interviews.
PR Team
Jan 5, 20243 min read


Why understanding your Dark Web Footprint can improve your overall security posture
What does it mean for my organization to have a dark web footprint? Let’s begin by stating that it’s highly likely that sensitive...
Heighten CORE Member
Oct 30, 20234 min read
bottom of page