Why is cyber security important?

Businesses not taking cyber security seriously are undermining how important it is for growth. Cyber security is covers all aspects of protecting our sensitive data held in various forms, such as personally identifiable information (PII), health records, intellectual property, industrial systems, critical infrastructure, governments and military information.

How to fix Java security issues while coding in IntelliJ IDEA

Nowadays, developers are responsible for more than just creating the application. Besides working on features, developers have to focus on their applications’ maintainability, scalability, reliability, and security. Many developers are unsure of where to start with security. In addition, most companies still work with a dedicated security team instead of having security expertise inside the team. A lot of developers practically live in their integrated development environment (IDE).

New Lookout global channel program ensures everyone has access to endpoint-to-cloud security

I’m excited to announce the launch of our new global channel partner program. Based on feedback from our partners, this new program will accelerate the growth of our global reach with exclusive benefits, comprehensive education, sales support and marketing resources.

Digging Into the Third Zero-Day Chrome Flaw of 2021

Hidden deep in Google’s release notes for the new version of Chrome that shipped on March 1 is a fix for an “object lifecycle issue.” Or, for the less technically inclined, a major bug. Bugs like these have been common in Chrome, leading some to wonder whether the world’s most popular web browser is as safe as it could be? Google created Chrome as a secure browser and has loaded it with a growing set of security features along the way.

Teleport in 2021: Security Audit Results

We now live in an era where the security of all layers of the software stack is immensely important, and simply open-sourcing a code base is not enough to ensure that security vulnerabilities surface and are addressed. At Teleport, we see it as a necessity to engage a third party that specializes in acting as an adversary, and provide an independent analysis of our sources.

Basic principles of Information Security | CIA triad (Confidentiality, Integrity, availability)

Learn about the 3 principles of information security and the difference between information and cyber security. The three core principles of information security are called CIA triad (confidentiality, integrity and availability).

Retailers Beware, Fraudulent Account Creation with Virtual Phone Numbers

In the last couple of decades, the retail industry has seen dramatic changes, both on the business and on the consumer side. Perhaps the most notable one is buyers’ ever-increasing shift from physical “brick-and-mortar” retailers to online e-commerce platforms. Unfortunately, this has also been accompanied by more and more fraudulent activities, which in turn required for more digital checks and balances.