Recently, Device Authority’s CTO James Penney recorded a podcast with Axeda Co-Founder and CTO Jim Hansen. Full disclosure: I was the first Salesperson hired by Axeda in 2001 and I can personally attest that at the time many companies thought we were out of our minds! In the early days, Axeda’s biggest challenge was getting machine makers to use this new thing called the Internet to remotely manage their high value assets in the field.
Tripwire recently announced the release of Tripwire Enterprise (TE), version 9.0, Axon Agent 3.27, and TE Agent 9.0.0. While the full list of features may be viewed on our web site, as a product manager, I wanted to take some time to introduce some of the changes in this new release.
As we enter 2023, both security and digital transformation efforts (e.g. cloud migration) continue to be important priorities for organizations. This combination brings huge challenges for IT teams, who are not only required to facilitate major digital changes and increase developer productivity but also ensure that this transformation is secure by default. When using AWS in particular, it’s challenging to understand how to strike this balance between accelerated cloud growth and security.
The ongoing rise in open source vulnerabilities and software supply chain attacks poses a significant risk, and it will only increase. According to the Mend Open Source Risk Report, modern security best practices such as software composition analysis (SCA) are vital for stemming the rising tide of open source vulnerabilities in applications and software.
The file has a virus or not! Though it is a four worded sentence, it is sure to scare you off. This concern is real as there is no scarcity of malware or viruses lurking in all corners of the world. Given the challenging technological scenario, detecting legitimate download sites is getting tougher every day. Fortunately, cybersecurity experts are saving us. Thus, detecting a virus corrupted file has become a convenient process.
This time, we will see how to get a deeper integration between OPA and Kubernetes with Gatekeeper and native CRD-based policies.
A venerable leader in the property and casualty and life insurance space, Zurich shares how it fights cybercrime with help from Tanium.
An access review describes the process of monitoring the rights and privileges of everyone who can interact with data and applications. This includes management of personnel, employees, vendors, service providers, and other third parties that your organization has been involved with. Also known as entitlement review, account attestation, or account recertification, access reviews are essential to the management, monitoring, and auditing of user account lifecycles.