Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Unified Agent - WhiteSource CLI

This is the fourth video in a series describing how the WhiteSource Unified agent can be used to detect open source artifacts and their known vulnerabilities and licensing risks. This video will focus on performing a scan with the WhiteSource CLI which is a lightweight version of the unified agent that is designed for immediate feedback on a user's desktop.

Zero Trust with Envoy, SPIRE and Open Policy Agent (OPA)

Enterprises have traditionally relied on perimeter network security to keep attackers out and protect their organizationally unique sensitive data and resources. This approach works on the principle “verify, always trust” wherein authenticated users inside the network are trusted by default and allowed unfettered access. With the shift to cloud-native architecture, perimeter-based defenses have become obsolete and leave systems inherently vulnerable to malicious actors.

Vulnerability Management - What You Need To Know

Vulnerability management is becoming increasingly important to companies due to the rising threat of cyber security attacks and regulations like PCI DSS, HIPAA, NIST 800-731 and more. Vulnerability management is a comprehensive process implemented to continuously identify, evaluate, classify, remediate, and report on security vulnerabilities.

Software Deployment Tools: SCCM vs Intune vs GPO vs More

There are many software deployment tools to deliver software and updates to your endpoints, but just because you have a lot of options doesn’t mean it has to be confusing. You might pick one software deployment tool to do it all, or you might pick several automated software deployment tools depending on your needs.