Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

ThreatQ v5: An Even Smarter Single Source of Truth

We’ve come a long way since ThreatQ v4 and our own Jay Allmond, UK Threat Intelligence Engineer at ThreatQuotient, recently shared the details during a hands-on webinar that’s now available on-demand. In this 30-minute session that as Jay says, “is light on PowerPoint and heavy on nerdy stuff”, we review the basics of the ThreatQ Platform and dive deep into some of the newest capabilities.

How Do You Perform a Supplier Risk Assessment?

When choosing a supplier to partner with, organizations need to perform their due diligence and assess the cyber risks associated with each particular supplier using risk assessment evaluations. Part of the supplier lifecycle management process includes ensuring that these third parties are meeting minimum security requirements, maintaining strong cybersecurity programs, and adhering to all relevant compliance regulations.

Random but Memorable - Episode 10.7: The Developer Special

Join us for the developer special! 👩‍💻🧑‍💻 Roo sits down with a panel of special guests to discuss how we're working and engaging with the dev community, the incredible suite of 1Password developer tools available, and a sneak peak at all the exciting things we have planned for the future.

Live Discord Community Call Demo: Build a SaaS Application with BoxyHQ's SaaS Starter Kit

Check out our live demo of BoxyHQ's SaaS Starter Kit, recorded during one of our recent Discord community calls! In this video, our team (Nathan Tarbert: Community Engineer) & (Kiran Krishnan: Senior Software Engineer) walks you through how to use our free out of the box Starter Kit to rapidly develop and deploy your own SaaS application. We cover everything from authentication and user management, to payment processing and database integration, all in one easy-to-use package.

Quality of Experience vs Quality of Service: Which are You Getting?

Quality of Service (QoS) is a standard metric for any infrastructure, networking, or operations team contracting with a tech vendor The average network SLA, for example, is crawling with QoS metrics covering a range of things, including packet loss, jitter, latency, bandwidth allocation, response time, and uptime.

Users From Two Dating Sites Get Exposed in Latest Breach

A few very personal and private specialized dating sites were recently hit by data attacks that have led to users being exposed and potentially released onto the internet. Sites CityJerks and TruckerSuckers both experienced data breaches from the same individual who is attempting to sell the stolen data. The information taken from these accounts is highly private and personal, and anyone involved in this breach is likely to be unhappy about having their data exposed.

Women in Cybersecurity UNITE

The gender gap in STEM fields is a huge problem. Women only make up 25.2% of the computer and mathematical occupations in STEM, even though these jobs are among the fastest growing and highest paid in the world. Why is this happening? What can we do to bridge the gap and get more women these lucrative careers? Those are questions we’re doing our part to solve at One Identity UNITE.