days
0
-74
-4
hours
-2
-1
minutes
-3
-3
seconds
-5
-8
search

#security

Interview with Jeff Williams, CTO and Co-founder at Contrast Security

“High-profile application attacks have continued and perhaps ramped up”

Jeff Williams, CTO and Co-founder at Contrast Security, answered our questions about application security, the newest executive order in the US, where vulnerabilities are most likely to occur, and more. Learn more about the Contrast platform and how it works to ensure software security.

Secure your greatest asset

Tips to Keep Your Data Safe from Increasing Cyberattacks

The increasing cyberattacks on businesses only mean that it is time to secure your company to keep data safe. With these tips provided, you can stay away from online threats that disrupt business operations. Preventing data breaches will definitely keep companies out of trouble.

Interview with Bryan Patton, CISSP and Quest Strategic Systems Consultant

“The average downtime due to a ransomware attack is 21 days”

Malware is every company’s worst nightmare and in 2021, cyberattacks are on the rise. We spoke with Bryan Patton, CISSP and Quest Strategic Systems Consultant about ransomware, how to protect your team against it, what to do after an attack, and why we’ve seen a spike in ransomware.

Interview with Sagi Rodin, Frontegg

“We are in the early stages of a huge shift away from building SaaS product capabilities in-house”

We spoke with Sagi Rodin from Frontegg about the challenges that SaaS companies face with ever increasing security threats and rising expectations from customers for greater control, freedom and independence. Sagi also talks about how utilizing easily integrated, full stack product capabilities can help solve this by allowing startups to keep focused on their core product, and launch faster with a more mature offering.

Security versus convenience

Please stop sharing your private keys

The battle between security and convenience is a trade-off that users, system administrators, security professionals and CISOs have to make every day. This is a particularly big problem for software developers and DevOps teams who commonly opt for the convenient solution of sharing private keys between one another.

Creating a security mindset

Baking Security into DevOps: Tips for Enablement

To create a security mindset within the engineering organization, security teams must enable engineering teams with the tools that suit their workflow. This article will explore how to bake security into the agile and DevOps way of working and what steps and practices to consider.

Combat threats

Why Do Companies Need Endpoint Detection & Response (EDR) Solutions?

Phishing emails carrying sophisticated malware undetectable by standard antiviruses more and more often serve as the main infection vector for data breaches and various cyber-scams. Protection against such threats requires a more advanced solution — a system for detecting attacks on endpoints, aka EDR (Endpoint Detection & Response). This article reveals how EDR identifies sophisticated attacks and whether it is worth installing it yourself or choosing EDR-as-a-service.

What it means for existing software dependent on IE

The Death of Internet Explorer

Internet Explorer (IE) will be officially retired on June 15, 2022. Microsoft will altogether stop supporting and updating the pioneering web browser. As IE winds down, the question becomes, how does this affect businesses and existing software, and what will its full impact be?