Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Evaluating Your Content Management Maturity

In this video, Egnyte’s Director of Value Realization, Karl Becker breaks down content from an AEC perspective. He covers: What is content? Why effectively managing it is so important What are some of the benefits of effectively managing content Becker and his team work with thousands of Egnyte clients and have developed a content maturity model to help them get the most out of their content, no matter where they are on their content journey.

New Year, New Features in Xray

Let’s start 2022 off the right with new features and updates that will extend JFrog Xray’s power and reach in addressing challenges with securing your binaries from development to production. Join Sarit Tager, VP Product Security as she discusses how Xray provides intelligent supply chain security and compliance at DevOps speed. JFrog Xray is a software composition analysis (SCA) solution that scans your open source software (OSS) dependencies for security vulnerabilities and license compliance issues.

Hello CISO - Episode 3 Part 1: Shadow IT and Working from Home

The migration from the office to WFH exposed a growing security threat that’s been on IT’s radar for years: shadow IT. With more and more workers using apps and services outside the purview of IT, a new way of thinking has emerged to confront the new reality. In part one of this episode of Hello CISO, Troy explains why shadow IT is here to stay, and why the loss of control that it brings isn’t the end of the world.

SecurityScorecard Acquires LIFARS; Empowers Orgs w/ View of Cyber Risk & Path to Cyber Resilience

Watch a video message from Aleksandr Yampolskiy, SecurityScorecard CEO & Co-Founder and Ondrej Krehel, LIFARS' CEO & Founder, about the customer benefits of this winning combination.

Triaging vulnerabilities - the way it ought to be

We all know that shifting security left is the right approach for securing our apps. We also know that it isn’t enough - developers also need to be empowered to own security. They require tools that integrate into the way they are already working and they need guidance and assistance from the security team. This is especially true for the most challenging vulnerabilities of all: those that are not so easy to fix, but too important to ignore.