Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Endangered data in online transactions and how to safeguard company information

This blog was written by an independent guest blogger. Online transactions are essential for every modern business. From online shopping to banking, transferring funds, and sending invoices, online transactions ensure utter convenience and efficiency. However, the familiarity of making financial transactions online can make people forget about security and all the dangers that they may be facing. On top of that, new cybersecurity threats keep popping up constantly.

Proactive Cybersecurity: How to Stay Ahead of Today's Threats

For many organizations, cybersecurity is an overwhelming challenge. New threats emerge seemingly in the blink of an eye, and IT and security teams are constantly reacting to the moves of bad actors who always remain one or two steps ahead and get to dictate where and when their attacks are carried out. As you might expect, a reactionary approach to cybersecurity is not ideal. It’s typically borne of necessity due to undermanned teams or inadequate resources. Ultimately, it is destined to fail.

What is Encryption? Difference between symmetric and asymmetric encryption

Encryption is the act of encoding information to make it unreadable for anyone other than those who are authorized to read it. There are two types of encryption: symmetric and asymmetric. Symmetric encryption uses the same key to encode and decode data, while asymmetric encryption uses different keys - one public key that can be shared with everyone, and one private key only known by the owner. In this video, we discuss the meaning of encryption and what it is used for. We also go over what asymmetric and symmetric encryption are.

The Missing Pieces in Securing your SDLC

Navigating the world of secure software development is hard. There is a lot of noise and not enough time to investigate everything thoroughly. Make your life and the lives of your colleagues easier by building a world-class DevSecOps automation pipeline. Automate feedback delivery in a way that makes sense. It doesn’t have to be hard; automate the pain away!

Demystifying DevOps-Pros, cons, dos & don'ts

We hear a lot about DevOps but how do we turn it from myth into reality? In this panel with Waleed Arshad, Community Manager at Snyk, Frank Dornberger, Team lead of DevSecOps at movingimage EVP GmbH, and Idir Ouhab Meskine, Staff Solutions Engineer at Splunk, we're go over: Waleed Arshad, Community Manager at Snyk Frank Dornberger, Teamlead DevSecOps at movingimage EVP GmbH Idir Ouhab Meskine, Staff Solutions Engineer at Splunk

Decibel Therapeutics Transforms Clinical Trial Document Management with Egnyte

The documentation around clinical studies is large and diverse – and it all must adhere to GxP standards. Learn how Heather Wolff, Vice President, Clinical Development Operations at Decibel Therapeutics, and her team of data managers, clinical operation experts, regulatory operations, medical writers, and biostats use Egnyte to streamline their compliance and data management processes. And, to learn more about how Egnyte helps other life sciences companies store, share, and audit critical documentation around clinical trials, visit: Egnyte.com/solutions/life-sciences.

CISO's Corner: The Four Best Cybersecurity Investments You Can Make During the Cyber Talent Shortage

The need for strong cybersecurity has reached critical mass. Seventy-six percent of security leaders have reported an increase in cyber-attacks over the past year -- accelerated by the COVID-19 pandemic and a rapid shift from an in-office to a remote workforce and on-premises to cloud infrastructure.

Security Cloud Considerations for Delivering Security Service Edge (SSE)

In recent blogs, we’ve explored the role of Security Service Edge (SSE) technologies as part of a SASE architecture, and the key differences between SSE and SASE. But so far, we’ve focused more on overall functionality than on its realization and what SSE means from a cloud design and implementation perspective. In this post, we shift gears to put a spotlight on networking and infrastructure as it relates to security clouds.

SSH Client Config Files and How to Use Them

SSH client configuration files allow us to connect to servers with pre-configured commands. This saves typing each SSH command parameter when logging into a remote machine and executing commands on a remote device. This article will examine secure shell (SSH) client configuration (config) files and their functions. Specifically, we will show an example of an SSH client config file to learn how to use these files before creating an example config file that connects to a fictitious server.