Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is the SIG Questionnaire?

The Standardized Information Gathering (SIG) questionnaire is used to perform an initial assessment of vendors, gathering information to determine how security risks are managed across 18 different risk domains. SIG was developed by Shared Assessments and is a holistic tool for risk management assessments of cybersecurity, IT, privacy, data security, and business resiliency. The SIG questionnaire was created by Shared Assessments.

SANS 2019 Incident Response Survey: Successful IR Relies on Visibility

During the past year, we have witnessed significant data breaches that have impacted industries ranging from hospitality to legal to social media. We have seen a continuation of financially motivated threats, such as business email compromise (BEC), which continue to plague corporate bank accounts. Ransomware has brought multiple cities, schools and universities to their knees, earning threat actors significant funds.

Kubernetes Security at RSA: The Time is Now

The RSA Conference—”Where the World Talks Security”—begins today. It’s a perfect time to take a hard look at security, and to investigate new solutions that help us all stay ahead of attacks and minimize risks. The team from Styra and Open Policy Agent will be there—eager to discuss advances in security for the cloud-native world.

Security Audit Results for Our Open Source Products

We now live in an era where the security of all layers of the software stack is immensely important, and simply open sourcing a code base is not enough to ensure that security vulnerabilities surface and are addressed. At Gravitational, we see it as a necessity to engage a third party that specializes in acting as an adversary, and provide an independent analysis of our sources.

Information Management vs. Knowledge Management

Your organization’s data is one of its most valuable assets. Unlike assets such as cash, however, data doesn’t always grow in value as it expands in volume — it must properly obtained, stored, secured, cleaned and surfaced so that it can put to use in meaningful ways. Accordingly, more and more businesses are looking to transition from information management to knowledge management systems. But what exactly are the differences between knowledge management and information management?

Knowledge Management System Types to Beat KM Challenges

The modern global economy is a knowledge economy — the future of a business depends on its capacity to support learning and collaboration. Proper maintenance of organizational knowledge, retention of practices and support of knowledge sharing are the key tasks of knowledge management (KM) programs. How can your organization implement an effective knowledge management system?

How to fix Error 429: Too Many Requests

Your application is running smoothly. Tests have passed. Suddenly you start to see 429 error responses from an API. As the name implies, you have made too many requests and your application has been rate limited. The 429 (Too Many Requests) error is an HTTP status code that often occurs when you've hit a request limitation of an API.