Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A definitive guide to Ruby gems dependency management

Ruby, much like other programming languages, has an entire ecosystem of third-party open source libraries which it refers to as gems, or sometimes Ruby gems. These gems are authored by the community, and are available from RubyGems.org which is the official registry for Ruby libraries. Similarly to other open source ecosystems, threat actors may publish deliberate malicious code or such which includes backdoors or credentials harvesting.

How Colleges & Universities Can Prevent Ransomware Attacks

In recent years, there has been increasing amounts of ransomware attacks on colleges and universities due to poor cybersecurity practices, a higher likelihood of ransom payment, and the value of information involved. The entire education sector performs poorly as a whole compared to other sectors when it comes to data security, and hackers are quickly taking notice.

WatchGuard in CRN's 2022 Top 100 Executives List

For the fourth consecutive year, CRN has named WatchGuard CEO Prakash Panjwani a Top 25 IT Innovator in its 2022 Top 100 Executives list. This elite awards program recognizes forward-thinking and innovative technology leaders who have proven their commitment and dedication to the channel through solution-provider-focused strategies and a willingness to take bold steps despite market unpredictability.

Top trends in Application Security in 2022

The rising number of cyber attacks against software applications has emphasized how security must serve as an important factor in software development. More than the traditional Software Development Lifecycle (SDLC) procedures, now security-integrated development lifecycles are being widely adapted. These aren’t the typical security assessments that are performed at the very end of development of the application, but embedded throughout the lifecycle.

How can we turn a hacker's toolkit against them?

Hackers use many tools at each stage of an attack. These tools are often readily available online, both free of charge and to buy, and easy to use for non-technical cybercriminals. Understanding a hacker’s tools and tactics is essential for cyber security practitioners and vendors aiming to build effective defenses and stay one step ahead of a quickly evolving host of cyber threats.

81.65% of cyberattacks target schools, how can we make sure hybrid education is secure?

Accelerated digitalization due to the pandemic and the need to adapt quickly to distance learning made schools the perfect target for cybercriminals. Moreover, compared to universities and based on disadvantages in terms of available technology and skills, primary and secondary education was even less prepared to meet the new security challenges posed by increased exposure and heightened risks.

Jay Thoden Van Velzen: How to prepare your security operations for a multi-cloud future

In our 10th episode of the Future of Security Operations podcast, Thomas speaks to Jay Thoden Van Velzen, Multi-cloud Security Operations Advisor at SAP. Prior to Jay’s current role, Jay scaled the Security Development Operations (SecDevOps) team from five to 25 team members across three continents and five countries and was the Initiative Lead for multiple security improvement programs for multi-cloud across SAP. Topics discussed in this episode.

Interview With Co-Founder Israël Hallé

For the next instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed Israël Hallé, Co-Founder of Flare Systems. Israël’s experience includes working with the Merchant Protection and Checkout team at Shopify. After that, he was a malware analyst and a reverse engineer at Google where he hunted down new malware threats and introduced automation operations through big data analysis.

Google Play Store Announces New Standards In Countering Misinformation And Improving Security

Google has unveiled new Play Store policies designed to reduce the spread of misinformation, limit advertiser behaviour, address alarms, VPNs & impersonation issues and enhance security. The app marketplace is constantly in flux, and app store proprietors must adjust their policies accordingly to keep up. Today, Google announced a bevy of Google Play Store policies that will go into effect over the coming months.