Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Webinar: How an insecure mobile app can tarnish your company's reputation

About The Webinar: Today’s cybersecurity threat landscape is highly challenging. Attackers are constantly on the lookout to exploit security vulnerabilities in applications and systems to gain access to or control sensitive information and launch cyberattacks such as ransomware. With companies spreading sensitive data across different platforms, software as a service (SaaS) platforms, containers, service providers, and even various cloud platforms, it’s essential that they begin to take a more proactive approach to security.

IoT and the GDPR - How to stay compliant

Businesses that incorporate Internet of Things (IoT) into their daily operations have rarely, if ever, had access to so many resources to help improve your customer reach, collect more personal data and reduce your internal operational expenses due to IoT automation. IoT devices are ubiquitous, and as technology advances, so does the invention and use of connected devices within workplaces and our homes.

What is Cloud Security Posture Management (CSPM)?

Businesses are moving their data to the cloud to reduce costs and increase their agility. As more applications and data migrate to the cloud, the risk of sensitive data and applications being exposed dramatically increases. In addition, as organizations deploy applications and services in different cloud environments, maintaining security and compliance across the board is becoming more complex than ever before.

11 Questions You Should Ask About Your Cloud Security

The world is becoming more digital with each passing day. Many companies are trying to transition to an online or to a hybrid system, where they can offer flexibility and autonomy to employees and have a more efficient way of managing their day-to-day operations. The digital transformation to the online world requires businesses to invest in cloud computing and cloud security software.

Your Ultimate Guide to Black Box, Grey Box and White Box Testing

Are you looking about getting a penetration test done, but you're not sure what kind of test to get. If you are an IT consulting company, you must have heard about black-box, grey-box, and white-box testing. The following are some of the most common questions asked when it comes to selecting the type of testing: Consider the advantages and disadvantages of black box, grey box, and white box testing.

Lookout Powers VMware Workspace ONE Mobile Threat Defense (MTD)

Lookout and VMware recently announced the debut of Workspace ONE Mobile Threat Defense (MTD), a new mobile security solution incorporating Lookout mobile protection technologies. Through this partnership with VMware, Lookout Mobile Endpoint Security is built in and can be activated seamlessly within Workspace ONE. This new solution is an extension of past integrations of Lookout with the Workspace ONE Trust Network.

How Hospital Hacks Happen 1: The Unmanaged IOT

"How Hospital Hacks Happen" is the first in a series of videos that aims to raise awareness and education regarding both how hospitals can be attacked and how they can better protect their patients, medical devices and systems. The videos showcase various attack vectors and actors. In this one we look at unmanaged Internet of Things (IoT) devices.

Staying Connected with Cloud Exchange: Netskope Cloud Threat Exchange & Digital Shadows Plugin

Many technology professionals have experienced the sense of frustration that occurs when multiple tools in their environment do not play nicely with each other. When technology leaders are making decisions about bringing new tools into their environment, they should be thinking about more than whether the platform is just a shiny new object that adds a new capability to their team.