What is “Cyber Herd Immunity” and “blind secret processing”? How does a decentralized system prevent vulnerabilities? We spoke with Yuval Herzog, Co-Founder and Technology Head at the Tide Foundation about security-centric solutions, PRISM authentication, and more.
We spoke to Chris Eng from Veracode about the UA-Parser-JS NPM Open Source library hack. What happened, what was the outcome, and what are unique open source security concerns? Chris Eng gives advice on how we can boost our open source security practices and avoid malicious code.
We’ve had a lot of questions about the state of organizational security lately. Brian Fox addressed our questions and concerns about making sure security and development go hand in hand. What cultural shifts need to happen to ensure that security is baked into every facet?
Tim Jarrett, Senior Director of Product Management at Veracode, answered our questions about the OWASP Foundation and its recent 20th anniversary. Tim discusses the importance of cybersecurity allies in the DevOps process and recommends some helpful security tools and tips.
Richard Piasentin, Chief Strategy Officer at Accedian, spoke with us about cybersecurity, network management solutions, the growing adoption of edge computing and its use cases, and more. Learn how to proactively focus on security in order to avoid unnecessary downtime.
To increase your readiness — and boost your security teams’ confidence — it’s important to move beyond formulating static incident response plans and instead leverage transitory crisis simulation pieces of training to mimic the effects of a real-world attack closely.
The importance of the cloud in any disaster recovery strategy is invaluable. The potential ripple effect of a service outage – because of a data breach – could lead to lost revenue, halted productivity and eroded customer trust. With the migration to the cloud, business continuity is now more than just disaster recovery.
The slow, hidden build-up of operational and security issues must be addressed before it can cause real issues. Dennis Mastin, DevOps Solution Engineering, CyberArk discusses the importance of secrets management, risks presented by security management sprawl, and how to manage this vulnerability.
Jeff Williams, CTO and Co-founder at Contrast Security, answered our questions about application security, the newest executive order in the US, where vulnerabilities are most likely to occur, and more. Learn more about the Contrast platform and how it works to ensure software security.
The increasing cyberattacks on businesses only mean that it is time to secure your company to keep data safe. With these tips provided, you can stay away from online threats that disrupt business operations. Preventing data breaches will definitely keep companies out of trouble.
Malware is every company’s worst nightmare and in 2021, cyberattacks are on the rise. We spoke with Bryan Patton, CISSP and Quest Strategic Systems Consultant about ransomware, how to protect your team against it, what to do after an attack, and why we’ve seen a spike in ransomware.
We spoke with Sagi Rodin from Frontegg about the challenges that SaaS companies face with ever increasing security threats and rising expectations from customers for greater control, freedom and independence. Sagi also talks about how utilizing easily integrated, full stack product capabilities can help solve this by allowing startups to keep focused on their core product, and launch faster with a more mature offering.
Pieter Danhieux, CoFounder/CEO of Secure Code Warrior discussed cybercrime with us. We learned all about common kinds of security vulnerabilities, best practices organizations should take to achieve property security compliance, and how teams can focus more on building security into their code.
The battle between security and convenience is a trade-off that users, system administrators, security professionals and CISOs have to make every day. This is a particularly big problem for software developers and DevOps teams who commonly opt for the convenient solution of sharing private keys between one another.