Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Bring a Healthy Dose of Skepticism ..... Please

We are asked to purchase something 4,000 times every day; that’s roughly once every 13 seconds during our waking hours. These “requests to purchase'' often come in the form of marketing messages that test the bounds of credibility. In the software industry, most of us have trained ourselves to question vendor promises vociferously.

What is the Difference Between Compliance and Auditing in Information Security?

Global information technology (IT) spending on devices, data center systems/software, and communications services reached $4.26 trillion in 2021 and is expected to increase to around 4.43 trillion U.S. dollars at the end of 2022. With this new, skyrocketing growth, organizations face complex new compliance and IT security challenges in how data and information are stored.

Organizations are traveling the road to cybersecurity automation, but it is not a smooth journey

Our latest industry research – ‘The 2022 State of IT Security Automation Adoption’ – which we have undertaken for the second year running and expanded into other regions including the UK, USA and Australia, shows strong signs that cybersecurity automation adoption is advancing, but 97% of respondents say they have experienced problems during implementation.

How to Make Container Security Threats More Containable

As cloud adoption and digital transformation increases, more sensitive data from applications is being stored in data containers. This is why effective container security controls to securely manage application connectivity is an absolute must. AlgoSec CTO and Co-Founder, Prof. Avishai Wool provides some useful container security best practices to help you do just that.

The Cycle: Global Threat Dynamics

On this inaugural episode of The Cycle, Bob Gourley, Co-Founder and CTO of OODA Loop, speaks on the current global threat landscape - demonstrating both the risks and opportunities for businesses. In addition to the strategic actions business can take to mitigate risks through automation, decision making and more - he dives deep into the geopolitical realities currently being faced and provides actionable recommendations for decision makers.

How to Perform a Cybersecurity Audit for Colleges & Universities

‍Cybersecurity audits are essential for any organization to review, analyze, and update its current IT infrastructure, information security policies (ISP), and overall cybersecurity risk management protocols. Audits are a critical part of information security and should be performed annually to ensure that new policies are implemented properly, potential vulnerabilities are identified, and the school maintains compliance with regulatory standards.