Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Case Study

How Azalea Health Ensures Customer Trust with Cloud-based Software Security

As head of the product department at Azalea Health, I need to understand what our market needs. Based on the conversations that we've had with hospitals and clinics, enterprise-grade security is something they desperately need but rightfully expect their EHR system to provide. That’s why it’s important for our organization to take the responsibility of securing health data off their shoulders.

Inside the SecOps Team at bet365: Moving your SIEM to the Cloud

Hello, I love to look behind the scenes of SecOps teams to learn how they operate. Recently I had the pleasure to work with John Eccleshare, Head of Compliance and Information Security, at bet365 as John took the stage at Gartner Security and Risk Summit in London.

How Gluu provides clients instant access to their Open-source platform using Teleport

With Teleport, Gluu can provide its clients with near-instantaneous access to its open-source software, allowing them to get up and running in minutes. This is a huge benefit for organizations who need to quickly provision their tools in order to start using them. In the past, Gluu has documented many ways that it uses Teleport to provide Gluu clients a gateway for their tools.

How the Parkinson's Foundation Stays Secure With a Small IT Staff

At the Parkinson’s Foundation, we believe data security is a team sport, which is why we rely on everybody in our organization to follow best practices for protecting our content. Like most organizations, we have several layers of sensitive content, including some of our accounting and marketing files.

How Spotify uses Snyk to secure the SDLC

Spotify’s engineering team recently published a blog discussing their use of Snyk to maintain security testing in the SDLC. The following is a recap of that blog written by Engineering Manager, Edina Muminovic. Spotify, a company known for employing thousands of world-class developers, needed to redraw its software development lifecycle, or SDLC.

How Onna Technologies uses Snyk & Sysdig to secure the SDLC while saving time and money

Onna Technologies, a data centralization software company, integrates security across every facet of their development process by using Snyk and Sysdig. We recently sat down with Onna’s Brent Neal (Director of Security), Mike Hoffman (Lead Security Engineer), and Andrew Leeb (Senior Software Engineer) to discuss data protection and compliance, cloud security priorities, and the benefits using Snyk and Sysdig for complete end-to-end container security.

How SIM card registration with ID Biometrics is revolutionizing telecom security in Lesotho, Namibia

The southern African nations of Lesotho and Namibia have newly begun programs for users to re-register their SIM cards with their biometrics and digital IDs, adding them to the list of newly joined countries adapting to the new norms in Africa. South Africa is also set to schedule biometric SIM registration, with further plans to push ‘ID4Africa’ as a type of incentive-based identity enrollment approach for governments.

MasterCard allows Digital ID Verification of patients on Mobile Phones.

Seamless and smooth is the new mantra that every company is trying to achieve in their operation and client’s dealings. Healthcare services are adapting fast to this mantra, and the master card is the new revolution keeping the industry in sync with high user experience through the implementation of ID verification. It’s the digital age; almost everything in this world now operates with the help of AI and its different realms.

Collaborating on Access Control Policies with Open Policy Agent

Zendesk Engineering consists of many teams that own a large number of different domains, ranging from engineering teams that built internal services to teams that work on our various product offerings. One concern that these teams have in common is controlling access to their APIs via fine-grained policies. Some APIs are only available to admins, others to users with a specific set of permissions and some APIs restrict access based on attributes of the data being accessed.