Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

What is Cross-Site Scripting (XSS)? Types of XSS, Examples, and Patching Best Practices

Cross-Site Scripting (XSS) is a security vulnerability that allows an attacker to inject malicious code into a web page viewed by other users, usually in a script. When other users view the compromised page, the injected code can execute and steal sensitive information or perform malicious actions on their behalf. This attack typically targets web applications that allow user-generated content or input, such as message boards, comment sections, or search boxes.

Xalient achieves Top 10 in The Sunday Times Best Places to Work Awards

Xalient voted as one of the top 10 best loved companies in the big organisations category. Xalient employees rate job satisfaction, happiness, wellbeing, empowerment and information sharing all 'excellent'. Xalient recognised in the Spotlight Award for the Best Places to Work for Women.

A Career in Cyber Security: Navigating the Path to a Digital Safekeeping Profession

Cyber security represents not just a robust field teeming with opportunities but also an increasingly pivotal aspect of global digital infrastructure. With the prevalence of digital threats, your expertise in this domain can lead to a rewarding and socially significant cyber security career. Employers across various sectors seek professionals who can protect their data and systems, offering a broad market for your skills.

Unlocking the Future: The 2024 Global Trends in AI Security Solutions

Dive into the future of security with Brivo's latest exploration of the 2024 Global Trends Report. As the pioneers in cloud-based access control and smart spaces technology, we're at the forefront of integrating AI and open technology (APIs) to revolutionize security solutions. This video unveils how next-gen security is shaping up to meet the industry's evolving demands, emphasizing AI's pivotal role and the seamless integration of technologies.

The dangers of enterprise attack surface expansion: Lessons from 5 major breaches

Enterprise attack surface expansion has become a focal point for IT security teams. The relentless pursuit of securing every endpoint and countering new threats with the latest technology is not just costly; it's also unsustainable. Despite these efforts, breaches continue to occur, often through new or unorthodox attack vectors that bypass traditional perimeter defenses.

CyberArk at 25: Udi Mokady on Milestones, Identity Security and Humility

Let’s head back for a moment to when some of us were partying like it’s 1999, in 1999. Among that year’s notable milestones were the release of The Matrix, the introduction of the euro – and the impending clock turn to 2000 (aka Y2K), which propelled prophylactic tech upgrades far and wide. Simpler times – at least in retrospect.

EP 52 - Built to Last: CyberArk's 25-Year Innovation Evolution w/ Founder and Executive Chairman Udi Mokady

In this episode of the Trust Issues podcast, host David Puner interviews CyberArk Founder and Executive Chairman Udi Mokady on the occasion of the company’s 25th anniversary. They discuss that milestone and reflect on CyberArk’s growth to becoming the global leader in identity security and the ever-evolving threat landscape – and how the company has scaled to meet it. Udi shares his insights on the company’s culture, values, philosophies and lessons he has learned.

Empowering Citizen Developers with Zenity's AI Tools

Empowering Citizen Developers: Using Zenity’s Tools in AI-Driven Development The ability to develop applications, automations, and bots without the need for custom coding, has resulted in a paradigm shift for cybersecurity. Now, more than ever, citizen developers can design and implement solutions without the need for a traditional coding background. Due to innovative tools and platforms, as well as the integration of AI, development is now faster, more accessible, and more efficient.