Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Opti9 Cloud Strategy - Services Built From Expertise and Experience, Customer-Centric Solutions

In this video, we explore the benefits of Opti9's cloud strategy services. We provide an in-depth overview of our customer-centric approach to cloud solutions and explain how our expertise and experience can benefit your business. Our solutions are designed to help businesses of all sizes, from startups to large enterprises, maximize their potential and thrive in today's digital landscape.

Opti9 and Arpio Webinar: Automated Resilience for AWS Workloads

This webinar, presented by Opti9 and Arpio, focuses on the topic of automated resilience for AWS workloads. With AWS being the leading cloud provider in the market, it is crucial for businesses to have a resilient infrastructure that can withstand failures and outages. In this webinar, we will discuss the challenges that businesses face when implementing a resilient architecture and how automation can simplify the process.

OptiXdashboard Cloud Management Tool - Manage Your Cloud Infrastructure with a Single Platform

In this video, we provide an overview of OptiXdashboard, a powerful hybrid cloud management tool that allows you to manage your entire cloud infrastructure with a single platform. Whether you are working with public or private clouds, OptiXdashboard can help you simplify and streamline your management tasks, providing you with greater visibility and control over your resources.

Top Changes in the OWASP API Security Top 10 2023RC

The OWASP API project has recently decided to refresh the popular API Security Top 10 threat map. The team at Salt Security has always been actively involved in this project, having been a key contributor to the initial creation of the list. And we continue to be deeply involved in the thinking process, data gathering, and brainstorming in updating it. As of the writing of this post, the final version of API Security Top 10 2023 has not been officially released.

Five worthy reads: Hello from the dark side-the nefarious nature of voice AI technology

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we are exploring voice-activated AI technology that allows computers to comprehend and respond to human speech, while analyzing some of its detrimental drawbacks.

Cyber Hack: iPhone Theft

This blog is about the most recent iPhone theft that left users unable to access their Apple ID accounts when their iPhone had been stolen. As you may know, Apple devices such as the iPhone and iPad store sensitive information, including passwords, account credentials, and login details. This makes them especially vulnerable to cybercrime, since if the device is stolen or hacked into, your confidential information can be exposed.

Realizing the True Power of Netskope Cloud Exchange

When I talk to customers and partners about Cloud Threat Exchange (CTE), I immediately say, “I’m not in marketing, and didn’t see the future—so I misnamed the module. I should have named it Cloud Data Exchange.” Why do I say this? Because, as Netskope and Cloud Exchange have matured, the number of use cases the module can fulfill has naturally grown beyond the initial vision. How so?