Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Open Source Licenses in 2021: Trends and Predictions

As this year comes to a close, it is a good time to take a look at the trends of open source license usage in 2020 and compare them to previous years. Our research team has collected information from the WhiteSource database, which includes more than 4 million open source packages and 130 million open source files covering over 200 programming languages, to learn which were the most popular open source licenses in 2020.

Coralogix - Panel Discussion: Elasticsearch is Not Open Source Anymore

Does SSPL license endanger your intellectual property? As of January 2021, Elasticsearch is no longer open source. From version 7.11 and onwards, all ELK products (Elastic, Logstash, Kibana) will be registered under the new SSPL license created by Mongo and now adopted by Elastic. In this panel, our IP expert lawyer discusses the new license and helps explain whether it impacts your business or puts it at risk.

Cloud Security vs. Network Security: Which is Best for your SME?

Being in cybersecurity line of business and being aware of the issues faced by multiple small to mid-sized businesses, we often come across various jargon which may be unclear to some. One of the most common questions for SMEs is should they focus on cloud security or network security. It is hard for SMEs to prioritise their security budget and find affordability with security. To make an informed decision, it’s important to understand the options.

Sequoia Capital Global Equities shares how Netskope Proved It

Patrick Fu, managing partner at Sequoia Capital Global Equities, discusses how Netskope proved it has become the unrivaled leader driving innovation across cloud, data, and network security and why after extensive analysis of dozens of security vendors, Sequoia decided to invest in Netskope.

Ensure Everyday is Data Privacy Day

It’s no secret that the world has become more dependent on mobile technology. We can now pay our bills, shop for groceries and share photos with family with the tap of a finger. But this also means that our personal data is now more exposed than ever. On the bright side, we are collectively becoming more conscious about data privacy. In 2020, TikTok kick started an unexpected global discussion about what data apps collect and how they are used.

Who Knows When, Or If, We'll Go Back to the Office? We Must Make Good Security Moves Regardless.

The management consulting firm Korn Ferry recently surveyed professionals about what they were most looking forward to when they return to the office, and more than 20 percent of them said “nothing.” (No kidding.) Some 64 percent of respondents are cited as saying that they’re more productive at home. (Not surprised.)

Security Challenges and Opportunities of Remote Work | Kill the VPN |

The COVID-19 pandemic forced many organizations to shift to a remote workforce almost overnight, most of which were not prepared for the sudden change. In their efforts to ensure their employees could remain productive, a number of organizations relaxed their security policies and unwittingly exposed their networks to compromise. As the pandemic continues, security challenges remain, but organizations also now have opportunities to find and fix vulnerabilities and improve their overall security posture, even as their employees eventually migrate back to the office.

Microservices, Containers and Kubernetes in 10 minutes

What is a microservice? Should you be using microservices? How are microservices related to containers and Kubernetes? If these things keep coming up in your day-to-day and you need an overview in 10 minutes, this blog post is for you. Fundamentally, a microservice is just a computer program which runs on a server or a virtual computing instance and responds to network requests.

Applying 3 Practical Lessons from the SolarWinds Breach

It’s been more than a month since the SolarWinds breach first started dominating security headlines, and we’re still learning new details about the attacks and the organizations affected. Even as the discussion quiets down, it’s easy to imagine we’ll still be looking back and analyzing the full effects of these incidents in much the same way we talk about other seminal breaches and security events from the past 20 years.

Be Ready for Anything with VMware Cloud on AWS

If the pandemic, catastrophic wildfires, record-setting hurricane season, and “murder hornets” of 2020 have taught us anything, it’s to be prepared for any situation. In business, the motto is “hope for the best, plan for the worst.” Should some sort of disaster – cyber or otherwise – strike, organizations need to be prepared to maintain business as usual with a strong disaster recovery plan in place.