Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How to Safely Integrate Networks During Mergers and Acquisitions

I recently published a piece in Dark Reading covering the network security challenges of M&A activity. As we ease the restrictions put in place to combat COVID-19, we’re expecting to see business activity including M&A pick up speed, it’s important that the implications of integrating networks are fully understood to ensure that the expected business benefits are achieved as soon as possible.

MPT's Value at Veracode

You finally have some budget to buy tools for your application security (AppSec) program! GREAT! Purchasing the correct tools for your AppSec pogram can be overwhelming. Even when looking only at point solutions, there still may be some confusion on the value that various tools can provide. Sometimes you'll find the perfect tool, but others may offer you a similar tool with added manual penetration testing (MPT) as part of the overall bundle. That seems like a great idea for the budget.

Sponsored Post

Robotic Data Automation (RDA): Top 5 emerging opportunities for CXO/IT leaders

As per Gartner, Hyper Automation is the top strategic technology trend for Enterprises. “The shift towards hyper automation will be a key factor enabling enterprises to achieve operational excellence, and subsequently cost savings, in a digital-first world,” said Cathy Tornbohm, Distinguished Research Vice President at Gartner. Businesses want to enable employees to make better decisions in the most cost effective way.

What are bots costing the financial services industry?

Netacea recently conducted a wide-ranging survey to uncover how much bots are really costing businesses. We compiled responses from 440 enterprise businesses spread across the US and UK, and have summed up our findings in an exclusive report, as well as an upcoming live webinar. Of all the sectors we surveyed, financial services was the industry most affected by API attacks, with 97% of businesses stating an API had been attacked by bots in 2020.

5 Tips to Provide Your Customers with The Advanced Endpoint Security They Really Need

Advanced cybersecurity is now the baseline of complex IT environments that include computers, servers, laptops, and other devices that may be used within the corporate network but also outside the office. It is also critical to face the growing threat landscape of advanced, silent, and targeted attacks. But how can you make sure you meet each of your customers’ specific requirements and deliver a cutting-edge IT approach in a way that is sustainable for your business?

Integrating static analysis tools with build servers for continuous assurance

Learn how to set up continuous assurance with Code Dx to improve code quality and security at the speed of DevOps. Continuous integration (CI) has made a tremendous impact on how we develop software. The concept is simple: fail fast and fail often. This allows the team to fix problems before they become a big deal, saving time and money.

How to Map HIPAA to ISO 27001

The Health Insurance Portability and Accountability Act (HIPAA) of 1996 is a U.S. federal law meant to protect sensitive electronic protected health information (ePHI). Every healthcare organization (“covered entity”) must comply with its two fundamental rules. In 2013, the U.S. Department of Health and Human Services (HHS) passed the HIPAA Omnibus Final Rule, which expanded compliance requirements to the business associates that also handle ePHI on behalf of covered entities.

Head-to-Head: Penetration Testing vs. Vulnerability Scanning

To release reasonably secure products, vendors must integrate software security processes throughout all stages of the software development lifecycle. That would include product architecture and design; implementation and verification; deployment and monitoring in the field; and back again to design to address the changing threat landscape, market needs, and product issues.