Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Six key findings from the 'DevSecOps Practices and Open Source Management in 2020' report

This week Synopsys released the “DevSecOps Practices and Open Source Management in 2020” report, findings from a survey of 1,500 IT professionals working in cyber security, software development, software engineering, and web development. The report explores the strategies that organizations around the world are using to address open source vulnerability management, as well as the problem of outdated or abandoned open source components in commercial code.

Why VPNs on mobile devices are a crucial part of securing access to corporate data

Securing access to business resources has always been of high priority for admins and IT teams. In the wake of the pandemic, workforces are more distributed than ever before, and 76 percent of global office workers state that they would like to work from home even when the pandemic is over.

Could electric vehicles present a Cybersecurity risk to the grid?

With many countries now participating in the Paris Agreement to address climate change, coupled with the rising popularity of electric vehicles, it is expected that 125 million electric cars will be on the road worldwide by 2030. But these cars, although beneficial to the environment, come with cybersecurity risks. According to experts, security concerns should be addressed before a massive rollout of electric vehicles take place.

2021 Predictions: The Year that Cloud-Native Transforms the IT Core

Continued Kubernetes adoption, unified authorization, DevSecOps redefined, open source dominance and more key changes for the enterprise Amid a year of unprecedented global change, it may seem incautious at best to make confident predictions about the future of cloud-native business. However, there are strong indications of the trends that 2021 will hold — precisely because they are predicated on significant enterprise change.

What is the best way to protect my PHP code?

The simple answer is to use a compiled code tool and implement as many security features as possible, but sometimes time can be a factor and other matters take precedence so less time goes into security. If your code is valuable then you really should spend time adding more layers of code protection (obfuscation, script licensing, encryption) and there is one feature in particular which sets ionCube apart from other tools, offers advanced protection for your PHP code and is fairly quick to setup.

Remote Employee Monitoring Software - How To Audit Employee Computer Activity | CurrentWare

⚠️UPDATE 2021⚠️ This video is from a legacy version of BrowseReporter. In this video CurrentWare’s product manager Sai Kit Chu shows you how to monitor the computer usage of employees that work from home. This video provides an overview of CurrentWare's remote employee monitoring software. Get the FREE trial to see what your remote employees are doing during work hours. This snippet was taken from our webinar "Best Practices for Managing Productivity and Security of Remote Workers".

Nature vs. Nurture Tip 2: Scan Frequently and Consistently

In our first blog in this series, Nature vs. Nurture Tip 1: Using SAST With DAST, we discussed how this year’s State of Software Security (SOSS) report looked at how both “nature” and “nurture” contribute to the time it takes to close out a security flaw. We found that the “nature” of applications – like size or age – can have a negative effect on how long it takes to remediate a security flaw.