Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

The Need for SSPM in the Digital Transformation Journey

During this past year, organizations have moved towards the adoption of SaaS (software-as-a-service) applications like Microsoft O365, Salesforce, and GitHub at a more rapid pace than originally planned to help accommodate and facilitate the many employees that became remote workers, needing access to cloud applications from anywhere.

Netskope Introduces Cloud Firewall-as-a-Service (FWaaS)

Change is the only constant and this is especially apparent for the firewall space, as we’ve seen with branch office transformation and users continuing to work remotely. Secure Access Service Edge (SASE) architecture, when properly designed, puts the user in the center with cloud edge security services protecting them, their data, and the apps and websites they use every day, on either company or personal instances.

What are Mobile App Security Standards?

With an increasing overflow of threats and attacks on mobile apps, businesses are now more concerned than ever about making their apps safe and secure for their users. Even the apps which were deemed to be secure and impenetrable are now being crept into with severe vulnerabilities. And this is why there is a huge priority shift happening across the globe towards mobile app security. According to Gartner , the global market for information security is expected to cross a market cap of$170.4 billion.

Hacker-Powered Security

This episode is a deep dive into how startups can leverage the power of crowd sourced hackers to find bugs and security issues in your apps. Ben Sadeghipour has over 685 vulnerabilities found in major sites such as Snapchat, AirBnB and even the U.S. Department of Defense, Hacker One helps companies by providing tools to help with response assessments and running their bug bounty programs.

Devo Joins AWS ISV Workload Migration Program

Devo’s strong relationship with Amazon Web Services (AWS) recently expanded to include our participation in the AWS ISV Workload Migration Program. This is important to cloud developers, DevOps engineers, solution architects (particularly cloud SAs), and cybersecurity architects working at organizations ready to transition their data to the cloud.

NC Protect for Microsoft 365 and SharePoint Advanced Information Protection & Compliance

Organizations have sensitive data spread across on-premises and cloud based platforms. This present a major challenge for IT to ensure data integrity and security. NC Protect is both content and context aware to automatically find, classify and secure unstructured data on-premises, in the cloud and in hybrid environments.

New Phishing Attacks Exploiting OAuth Authentication Flows (Part 3)

This blog series expands upon a presentation given at DEF CON 29 on August 7, 2021. In Part 1 of this series, we provided an overview of OAuth 2.0 and two of its authorization flows, the authorization code grant and the device authorization grant. In Part 2 of this series, we described how a phishing attack could be carried out by exploiting the device authorization grant flow.