Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Securing the Software Supply Chain: Key Findings from the Mend Open Source Risk Report

Threat actors will always target the things most important to businesses, and today, that means applications–the lifeblood of the global economy. As the recent Mend Open Source Risk Report reveals, the ongoing rise in open source vulnerabilities and software supply chain attacks presents significant business risk. The number of open source vulnerabilities are growing, just as threat actors are launching increasingly sophisticated attacks.

Why Organisations Must Get to Grips With Cloud Delivered Malware

Netskope has just published the Monthly Threat Report for February, with this month’s report focused on what is going on in Europe. I don’t intend to summarise the report in this blog, instead I want to zoom in and study a continuing trend that was highlighted in there; one that is unfortunately heading in the wrong direction.

SAST Tools: How to Integrate and Scale Security Workflows in the SDLC

Static Application Security Testing (SAST) tools present a significant opportunity for organizations looking to reduce application security risk. However, not all workflows or tools are created equal. Using the right SAST tools at the right times, you can seamlessly integrate and scale security workflows throughout the software development lifecycle (SDLC).

ICYMI: 3 Takeaways from a Former Healthcare CISO on Managing Cloud Data Security Risks

Last month, we hosted a webinar with our CISO, Karim Beldjilali, who was formerly the CISO of Rightway a healthcare startup. Karim shared important security lessons for healthcare organizations leveraging cloud applications across their workforce. We briefly share the highlights below.

The Biggest Cloud Security Challenges in 2023 and How to Avoid Them

With the rapid growth of cloud technology, it is no surprise that security has become a major concern for organizations. Cloud computing provides numerous advantages in terms of cost savings and scalability, but these benefits come with risks. As businesses move to the cloud, they must be aware of the potential security threats and take appropriate steps to protect their data and systems from malicious actors.

Security Enablement in a World of Digital Transformation

39% of organizations already use low-code and another 27% plan to start doing so in the next year (Forrester). By 2025 more than 70% of all application development will be done using no-code/low-code (LCNC), according to Gartner. LCNC is already everywhere – so what does that mean for your business?

Eight Things to Consider if You're Considering ChatGPT

Since ChatGPT was released by OpenAI last year, large language models like it have gone viral. Cheerleaders extol these AI models as the future of work, maybe the best thing to happen since the invention of the internet, or as the invention that changes everything. Detractors point to their gaffs, failures, and “hallucinations.” Both Google and Microsoft have been embarrassed in the last several days by the outputs of their respective chatbots.

Setting Up a New eTMF Study in Egnyte

Egnyte’s eTMF allows you to assemble all the critical documentation related to your clinical trial so that you stay on track and audit-ready. Running your own eTMF gives you full visibility and control over data that is critical to the success of your company. In this article, you’ll learn how to set up a new study in Egnyte’s eTMF app.

What is Apple Code Signing Certificate?

You must have seen various online resources about removing Unknown Publisher Warning on windows systems. And using a code signing certificate with Windows utility tools. But, as a macOS and iOS developer, that is of no use to you, as it would not be compatible with Apple’s ecosystem. However, it doesn’t mean that there’s no software security solution for macOS apps. To make an application for Apple devices tamper-proof, you can avail of the Apple Code Signing Certificate.

3 Ways To Address Your Kubernetes Data Protection Challenges

Kubernetes is an open-source container orchestration tool originally developed by Google for managing microservices or containerized applications across a distributed cluster of nodes. It is widely thought that “Kubernetes is key” to cloud-native application strategies. Kubernetes (K8s) runs over several nodes, and the collection of nodes is called a cluster. K8s clusters allow application developers to orchestrate and monitor containers across multiple physical, virtual, or cloud servers.