Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding Data Protection Needs in a Cloud-enabled Hybrid Work World

Today, Netskope partnered with the Cloud Security Alliance to release the Data Loss Prevention (DLP) and Data Security Survey Report, a survey focused on data protection needs in cloud and hybrid work environments. Unsurprisingly, the report found that the biggest pain point organizations identify with trying to modernize their data protection strategy is that current DLP deployments show limitations when it comes to cloud and remote work use cases, and they are a nightmare to manage.

AWS top 10 misconfigurations and how to fix them: A cheat sheet

Amazon Web Services (AWS) remains the dominant cloud provider, with 40.8% of the market share. Many enterprises and organizations today have some, if not most, of their infrastructure on Amazon Web Services. AWS helps organizations accelerate their digital transformations and innovate faster, but there are common misconfigurations when moving to AWS.

New language-specific Snyk Top 10 for open source vulnerabilities

Developers use open source code because it facilitates fast development. In fact, the vast majority of code in modern applications is open source. But just like any other code, open source libraries are open to vulnerabilities that can negatively affect a wide range of end-user products. So with widespread usage of open source, it's important for teams to be aware of the risks that can be hidden in the libraries they use.

Eliminate Special Tools With Egnyte's PDF Annotation Feature

Portable Document Format (PDF) files are popular in the Architecture, Engineering, and Construction (AEC) industry for their standard format that can be viewed and interacted with by anyone with access to the file. But what makes PDF files even more powerful is a users’ ability to easily annotate the file with their changes, edits and suggestions.

Code Signing Certificates Price Hike up to 3X to 4X

The price of the OV and EV Code Signing Certificate is going to increase shortly by 3x to 4x. But, there’s a valid reason behind it, which you must know and understand. However, SignMyCode doesn’t let its customers pay the additional cost. That’s why we have also brought the solution for getting Code Signing Certificates at the cheapest price. So, let’s get started to know the reason behind the hike and the solution to grab the lowest price deal.

Hello CISO - Episode 10: The CISO Regulation Minefield

You can’t undertake every compliance initiative under the sun, so how do you prioritize? Talk to the right people, understand the ripple effects of each initiative, and know which will harm and which will strengthen security. Hello CISO is a collaboration between Troy Hunt and the people who build the world's most trusted enterprise password manager.

Coffee with Jim - Securing Against Supply Chain Cyber Attacks

Following the ransomware attack on US IT firm Kaseya, join us for a chat about the ever-increasing need to secure ourselves successfully against not only direct ransomware attacks, but those that affect us through our supply chains. An estimated 200+ firms have been crippled by the attack on Kaseya, simply because they use Kaseya’s software. The implication of this is that it can feasibly happen to any aspect of your supply chain, so if cyber security is not high on your board’s list of priorities, it really should be. How could the attack on Kaseya, and other supply chain attacks, have been avoided? How can you reduce the probability of it happening to your own organisation? And crucially, how can you make the solution cost effective?