Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Netskope Intelligent SSE and Aruba Secure SD-WAN Integrate for SASE Success

At Netskope, our primary focus in the marketplace is to help customers protect their data. More and more data exists outside the traditional enterprise perimeter and is growing at an ever-rapid pace. More than 80% of users are using personal apps and instances from managed devices, and of those applications being accessed, roughly half would be given a “Poor” risk rating by the Netskope Cloud Confidence Index.

SOAR Market Guide 2022: What does the Gartner research say?

While Gartner hasn’t released the SOAR Magic Quadrant, to the delight of many SOAR enthusiasts, the highly anticipated Gartner SOAR Market Guide for 2022 is out and we are happy to announce that Sumo Logic has been included again! Even though Security Orchestration, Automation and Response (SOAR), as a relatively new security category, doesn’t have a SOAR Magic Quadrant, Gartner is already dedicating a market guide for SOAR solutions.

What is a Good HECVAT Score?

The HECVAT (Higher Education Community Vendor Assessment Toolkit) is a security assessment framework in the form of a questionnaire that’s specifically designed for higher education institutions to measure vendor risk. HECVAT attempts to standardize higher education information security and data protection requirements for cloud service providers and third-party solutions, specifically for their consistency, compatibility, and ease of use.

Bring a Healthy Dose of Skepticism ..... Please

We are asked to purchase something 4,000 times every day; that’s roughly once every 13 seconds during our waking hours. These “requests to purchase'' often come in the form of marketing messages that test the bounds of credibility. In the software industry, most of us have trained ourselves to question vendor promises vociferously.

What is the Difference Between Compliance and Auditing in Information Security?

Global information technology (IT) spending on devices, data center systems/software, and communications services reached $4.26 trillion in 2021 and is expected to increase to around 4.43 trillion U.S. dollars at the end of 2022. With this new, skyrocketing growth, organizations face complex new compliance and IT security challenges in how data and information are stored.

Organizations are traveling the road to cybersecurity automation, but it is not a smooth journey

Our latest industry research – ‘The 2022 State of IT Security Automation Adoption’ – which we have undertaken for the second year running and expanded into other regions including the UK, USA and Australia, shows strong signs that cybersecurity automation adoption is advancing, but 97% of respondents say they have experienced problems during implementation.

How to Make Container Security Threats More Containable

As cloud adoption and digital transformation increases, more sensitive data from applications is being stored in data containers. This is why effective container security controls to securely manage application connectivity is an absolute must. AlgoSec CTO and Co-Founder, Prof. Avishai Wool provides some useful container security best practices to help you do just that.