Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mend.io Collaborates with Kondukto's New Demo Hub

When you’re trying to choose the right application security solution, navigating the options on the market can be bewildering. At Mend.io, we know that software developers and DevOps professionals use multiple tools to identify security issues in different stages of the software delivery life cycle and different code types. And we’re dedicated to making every aspect of AppSec as seamless as possible, which includes making your solution selection as easy as it can be.

Bringing IT & OT Security Together: Part 1

Many enterprises in verticals such as power and energy, oil and gas, healthcare, and manufacturing have been playing catch up over the past decade in terms of securing their operational technology (OT) networks against cyberattacks. For years, industrial asset owners didn’t consider their OT environment to be a significant security risk.

Aruba Networking EdgeConnect Partner of the Year

Huge congratulations to the Xalient team for winning the North America Aruba EdgeConnect Partner of the Year 2023! We are thrilled to have increased our EdgeConnect revenues with HPE Aruba Networking by more than 55% year on year, and our platinum certifications across the organisation have increased by more than 100%. Xalient ranks at the top in partner-initiated opportunities, and our consulting efforts drove the SD-WAN decision for seven multi-million dollar opportunities, making us the professional services organisation to deliver nine major EdgeConnect implementations.

Application Programming Interface (API) testing for PCI DSS compliance

This is the fourth blog in the series focused on PCI DSS, written by an AT&T Cybersecurity consultant. See the first blog relating to IAM and PCI DSS here. See the second blog on PCI DSS reporting details to ensure when contracting quarterly CDE tests here. The third blog on network and data flow diagrams for PCI DSS compliance is here.

5 Things a Security Manager Should Check Every Morning

As a security manager, you have a wide variety of tasks you need to complete in order to protect your organization — as well as your employee and customer data. Of course, some of these responsibilities are performed on a quarterly or yearly basis, such as gathering information for audits or conducting annual assessments. But there are certain tasks that you should be completing daily in order to maintain the desired security posture and reduce cyber risk across your expanding attack surface.

7 things that your EASM platform should be able to do

Greetings, digital guardians. Today, we’ll be diving into the wonderful world of External Attack Surface Management (EASM) platforms. As the sun rises on another day in your cyber kingdom, you may find yourself wondering whether your EASM platform is really up to the task of protecting it. In this article, we’ll be your guiding light in the dark alleys of EASM uncertainty.