Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Panel Open Source Security - Weighing the Pros and Cons

Over the past few years, open source has grown in popularity especially among developers using open source code in their application development efforts. In the security space, however, open source hasn’t been as widely embraced, mostly because of concerns over vulnerabilities. But is open source software really less secure?

Panel Discussion: Forrester's Latest Wave Report on Software Composition Analysis 2019

Last week The Forrester Wave™: Software Composition Analysis, Q2 2019 was published. We took part in MediaOps panel discussion to discuss the results of the report and which SCA vendors are right for software development and security teams and their needs.

5G Technology: How to Make Sure the Benefits Outweigh the Security Risks

It’s hard not to say that 5G technology brings a lot of benefits. 5G entails faster download speeds, and yes, if you have a 5G-enabled handset, you could hear and appreciate the speed increases for videos, gaming, etc. However, 5G provides added benefits that go way above those for the everyday user. Let’s take a look at the high speed and low latency of 5G. There are a lot of areas or industries that require pinpoint accuracy and precision.

5 most common mobile phishing tactics

Phishing is one of the things that keeps CISOs up at night. Phishing attacks are effective and simple to launch, and used by financially motivated attackers as well as more targeted attacks. In the case of a targeted attack, it may harvest login credentials to gain access to corporate or personal resources. In fact, sometimes corporate access can be used to steal personal data, and vice versa.

Effectively Managing The Shift To A Remote Workforce

2020 Has left many people feeling like we’re living in an alternate reality as COVID-19 sweeps the globe, changing life as we know it. Companies ultimately have no choice but to embrace the reality of a fully remote workforce where reliance on technology becomes critical to business continuity. Watch the Webinar Reply to learn more.

G2 Names Egnyte Top Remote Tool

As businesses adjust to flexible working arrangements amidst stay-at-home orders and social distancing guidelines during the COVID-19 (coronavirus) pandemic, many are looking to technology to support the needs of remote workers. While many companies were already using software to support working outside of physical offices, tools that enable remote working have now become mission critical in many cases to avert disruption during the unprecedented time we find ourselves in.

7 key steps to Zero Trust

This is part 3 of a 3 part blog series My last two blog entries provided some key elements of a Zero Trust Network (ZTN), which focused on the tenets of zero trust and how the confidence is gained for untrusted traffic and authorized on a continual basis. The comprehensive nature of Zero Trust can be a little overwhelming in a world of limited resources, time and budgets.

Detectify security updates for 16 April

For continuous coverage, we push out major Detectify security updates every two weeks, keeping our tool up-to-date with new findings, features and improvements sourced from our security researchers and Crowdsource ethical hacker community. Due to confidentially agreements, we cannot publicize all security update releases here but they are immediately added to our scanner and available to all users. This post highlights a few things that we have improved in the last two weeks.