Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Everything You Need to Know to Improve JavaScript Security

JavaScript is a great programming tool, but JavaScript security problems can cause significant damage to organizations and their customers. To help cybersecurity professionals and software developers better understand everything they need to know to improve JavaScript security, we’ve developed a free, comprehensive e-book, The Ultimate Guide to JavaScript Security.

Veracode Acquires ML-Powered Vulnerability Remediation Technology From Jaroona GmbH

On the heels of our significant growth investment from TA Associates, we are pleased to announce our acquisition of auto-remediation technology from Jaroona. Jaroona’s intelligent remediation technology accelerates Veracode’s vision and strategy to automatically detect and remediate software vulnerabilities. Jaroona was recognized as a Gartner Inc. 2021 Cool Vendor for DevSecOps.

Save Money, Build Faster and Deliver Higher Quality Projects with Egnyte

Saving money, building faster, and delivering higher quality projects is the goal of every AEC firm. But when you can access the files you need where you are you end up with wasted time and wasted money. Egnyte gives you fast access to your critical data whether you are in an office, at home, or on the jobsite, so you can ensure jobs get done right the first time.

Enhancing Your Operational Technology Resiliency

Maintaining cyber resilience across your ecosystem is a significant challenge that must not be brushed aside as the likelihood of experiencing a cyber incident increases year after year. For example, in 2021 alone, there were multiple attacks on Critical National Infrastructure (CNI) such as Colonial Pipeline and against the Oldsmar, Fla. water treatment plant.

3 Critical Lessons & Takeaways from the Okta Data Breach

Last month’s revelation that Okta had been hacked created a seismic impact in the world of security, with organizations still bracing themselves for the fallout from this incident. While resources, like Microsoft’s article on Lapsus$ (tracked as DEV-0537), have broadly dissected the attack vectors used in the group’s attacks, we wanted to expand on the broader trends and context surrounding the Okta hack.

Join the red team: Why every business should adopt an adversarial mindset

Netacea CTO Andy Still was recently joined on the Cybersecurity Sessions podcast by Jonathan Echavarria, an offensive security expert and Enterprise Architect at ReliaQuest. Jonathan shared his perspectives and philosophies around offensive security and what he gained from his time being part of a ‘red team’ at Facebook. Let’s recap some of the insights Andy discussed with Jonathan.

State of Security Research Details Essential Strategies for the Year Ahead

This year, security teams face more challenges — old and new — and grapple with high rates of burnout. Cloud complexity, supply chain attacks and additional obstacles are pushing security teams to the limits, and inspiring new responses. New research points to key strategies that will help organizations weather the complex challenges and attacks ahead.

Why Security Strategies Should Matter to the CIO

In the face of this constant disruption, CIOs are supporting the addition, amendment, or strengthening of logistics workflows, supply chains, commercial and service delivery models, partnerships, and geographic footprints. In all of these programmes, CIOs often see cybersecurity as a hurdle—one more challenge to navigate in the path to a successful business outcome.