In 2011, my co-founders Azi Cohen, Ron Rymon, and I founded WhiteSource with a mission to automate all tasks surrounding the use and security of open source software. We were pioneering the software composition analysis (SCA) market before it had a name. Over the years, we’ve evolved to offer more value to our customers beyond our founding purpose.
It was a busy week last week at KubeCon +CloudNativeCon Europe 2022 in Valencia, Spain. It seemed like the entire world related to Kubernetes came together after two years of being apart. It was fulfilling meeting up with our peers and gaining market insight- face-to-face. Catalogic’s core messaging this year has revolved around cyber-resilience for data protection.
Five years ago this month, the WannaCry ransomware attack encrypted an estimated 230,000 systems running Windows in private and public sector organizations globally, including high-profile companies like FedEx, the NHS and Honda. The financial impact was substantial; Symantec estimated WannaCry caused about $4 billion in losses
Securing databases is a significant aspect of an organization’s infrastructure and security practices. This article explores the methodologies and steps for securing MongoDB Database, a popular non-relational, flexible, and document-oriented database. Before starting, you should understand the difference between self-hosted MongoDB and MongoDB Atlas.
Cybersecurity attacks aren’t aimed solely at individual organizations anymore. In a growing number of cases, these incidents are affecting numerous companies within supply chains. Just look at some of the recent cyber events, including the attacks against Solarwinds and Kaseya, and vulnerabilities such as the one discovered in Log4j in late 2021. These incidents reveal weaknesses within supply chains that can lead to repercussions for hundreds or thousands of companies.