Securing the bricks and architecture

What can toy building blocks teach developers about security best practices?

Modern application development, when broken down, isn’t too dissimilar to using toy blocks to build a bridge. For example, to build a secure bridge, it is not sufficient to focus on each brick individually to determine if the bridge is strong enough. The builder must understand the bigger picture, or the ‘architecture.’

Interview with Yuval Hertzog, Co-Founder and Technology Head, Tide Foundation

“Human beings are cybersecurity’s weakest link”

What is “Cyber Herd Immunity” and “blind secret processing”? How does a decentralized system prevent vulnerabilities? We spoke with Yuval Hertzog, Co-Founder and Technology Head at the Tide Foundation about security-centric solutions, PRISM authentication, and more.

Interview with Chris Eng

“Proactive security scanning of code is a must”

We spoke to Chris Eng from Veracode about the UA-Parser-JS NPM Open Source library hack. What happened, what was the outcome, and what are unique open source security concerns? Chris Eng gives advice on how we can boost our open source security practices and avoid malicious code.

Interview with Brian Fox, CTO and Co-founder of Sonatype

“Organizations have to focus on smart security”

We’ve had a lot of questions about the state of organizational security lately. Brian Fox addressed our questions and concerns about making sure security and development go hand in hand. What cultural shifts need to happen to ensure that security is baked into every facet?

Interview with Jeff Williams, CTO and Co-founder at Contrast Security

“High-profile application attacks have continued and perhaps ramped up”

Jeff Williams, CTO and Co-founder at Contrast Security, answered our questions about application security, the newest executive order in the US, where vulnerabilities are most likely to occur, and more. Learn more about the Contrast platform and how it works to ensure software security.

Secure your greatest asset

Tips to Keep Your Data Safe from Increasing Cyberattacks

The increasing cyberattacks on businesses only mean that it is time to secure your company to keep data safe. With these tips provided, you can stay away from online threats that disrupt business operations. Preventing data breaches will definitely keep companies out of trouble.

Interview with Bryan Patton, CISSP and Quest Strategic Systems Consultant

“The average downtime due to a ransomware attack is 21 days”

Malware is every company’s worst nightmare and in 2021, cyberattacks are on the rise. We spoke with Bryan Patton, CISSP and Quest Strategic Systems Consultant about ransomware, how to protect your team against it, what to do after an attack, and why we’ve seen a spike in ransomware.

Interview with Sagi Rodin, Frontegg

“We are in the early stages of a huge shift away from building SaaS product capabilities in-house”

We spoke with Sagi Rodin from Frontegg about the challenges that SaaS companies face with ever increasing security threats and rising expectations from customers for greater control, freedom and independence. Sagi also talks about how utilizing easily integrated, full stack product capabilities can help solve this by allowing startups to keep focused on their core product, and launch faster with a more mature offering.