Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

The Kubernetes' Open-Source Tools to Check out in 2022

In 2014, Kubernetes surfaced from work at Google and quickly became the de facto standard for container management and orchestration. Despite its silicon valley origins, it became one of the most impactful open-source projects in the history of computing. Today, the Cloud Native Computing Foundation (CNCF) maintains Kubernetes with many private companies and independent open-source developers.

Interview with Bill Kunneke, Chief Technology Officer at Leasecake

For our latest specialist interview in our series speaking to technology leaders from around the world, we’ve welcomed Bill Kunneke, Chief Technology Officer at Leasecake. Bill has over twenty years of experience as an IT professional and a proven technical leader who delivers large and often transformative IT projects while communicating complex technical solutions to key stakeholders and executing strategic IT functions.

The Oculus (Meta) Quest Scam

Oculus (also now known as Meta) Quest is a virtual reality headset and game craze created by Facebook, and it is the ultimate tech must-have for the holidays in 2021. My 11-year-old son is obsessed with it and during the past few months it has been impossible to get due to a recall and the wait for the new Quest 2 to be released.

Guide to Performing a Data Risk Assessment

Most companies know how to engage in a security risk assessment. However, the first step in the security assessment process should be engaging in a data risk assessment. While the two sound similar, they provide different insights. This guide to performing a data risk assessment explains what it is, why it’s important, and how to engage in one.

How your business can benefit from Cybersecurity automation

Enterprises and small businesses alike are facing challenges that impact their ability to maintain adequate cybersecurity. Budget constraints and limited staff are just a couple of reasons why businesses have become more susceptible to cyberattacks. Hackers are becoming smarter, and the tools that teams deploy are growing in number, leading to fragmentation and increased vulnerabilities.

WhiteSource Research: Fixing Vulnerable npm Packages Quickly and Painlessly

Over the past few years organizations have been shifting security tools and practices left to ensure that application security is addressed from the earliest stages of the software development life cycle (SDLC). These efforts also increasingly cover open source components, which comprise up to 80% of our software products.

The Growing Cybersecurity Risks to Retail Organizations

November and December can be particularly stressful for retail organizations—and not just because of the holiday madness. As the volume of transactions ramps up during the holiday season, IT teams must be on high alert for threats buried in a sea of routine activity. But given the exponential growth of ecommerce, they also need to stave off cyber threats.

The Network Effect and the Search for Resilient Email Security

'Email is dead. It's a thing of the past.' In the IT industry, this statement, or something like it, is said regularly — usually corresponding with the rise of a new communication or collaboration platform. Each time this happens, it's prudent to remember a general rule around tools: as long as they retain specific advantages for the human beings using them, they generally endure.