Security | Threat Detection | Cyberattacks | DevSecOps | Compliance



DevSecOps and log analysis: improving application security

More and more organizations are abandoning the outdated waterfall development methodology for more practical and efficient Agile development practices. As this movement has occurred, development teams are moving faster than ever by employing Continuous Integration (CI) and Continuous Deployment (CD) practices that are serving to shorten development cycles and get new features into production faster. This does, however, come with greater security risk in some respects.


Key Insights Into Gartner Report: How to Select DevSecOps Tools for Secure Software Delivery

With the advent of complex technology ecosystems like agile development processes, cloud-native platforms, and the rising use of open-source software, the importance of continuous Security and compliance has increased more than ever. As a result, leaders in the software industry must advise their teams to incorporate developer-friendly security tools into their DevSecOps pipelines.

Social Engineering of Salespeople in Cybersecurity

Tom Kanan is a nine-year veteran of business-to-business security sales. He’s an active member of OWASP and the Cloud Security Alliance who believes in deeply understanding his customer’s business needs. This episode focuses on improving the dynamics between security and sales teams, both internally and externally.

Ditching the SDLC w/ Raj Umadas

I had the pleasure of chatting with Rajendra (Raj) Umadas, who is working as the Head of Information Security at Actblue. He’s been involved in security programs for some truly cutting-edge organizations, like Etsy, Spotify, WeWork, and Compass. Raj is not just a security expert, but also a true leader. Our conversation weaves together his reflections on security and leadership. Check out the full episode here.


DevSecOps lifecycle coverage with new Snyk and Dynatrace app

Balancing the volume of applications and the increased deployment frequency with the need for security is a struggle for both development and security teams. Recent research indicates that vulnerability management in modern software development has become more complex, with 69% of CISOs acknowledging this challenge. Consequently, many applications are not adequately covered by security scans.


In the age of AI, how do you know what data to trust?

Last week, the godfather of AI, Geoffrey Hinton smashed the glass and activated the big red AI alarm button warning all of us about creating a world where we won’t “be able to know what is true anymore”. What’s happening now with everything AI makes all the other tech revolutions of the past 40 plus years seem almost trivial.

Instaproof in action! Drag. Drop. Verify!

Will demonstrates how easy it is to use RKVST Instaproof to verify the authenticity of a document. With Instaproof, you can drag and drop any file to instantly verify its origin, so you can make informed decisions about whether to trust it or not. Instaproof is perfect for anyone that wants to ensure the authenticity and provenance of their data, whether it's for regulatory compliance, intellectual property protection, or just good business practice.

RKVST Instaproof - instant data provenance

Drag. Drop. Verify! Instantly verify the origin, provenance and authenticity of any file with a simple drag and drop. Quickly identify fraudulent or modified data, or data of unknown provenance. RKVST Instaproof is the fastest way to instantly prove who did what when for any digital asset. Connects with your existing data – on premises or in the cloud including Dropbox, OneDrive and Google Drive