<
>

Four Measures to Prevent Being Held to Ransom by Malicious Actors, or Cyber Insurers

Authored by: Ravi Rajendran, Vice President, Asia Pacific and Japan Insurance by definition is ‘a financial agreement with a company where you pay regular amounts of money and they agree to pay the costs, if you are...

Getting ‘En Garde!’ Against The Ransomware Siege

Authored By: Charles Chow, Director of Sales Engineering, Commvault   Much like how the world is grappling with a health crisis right now, the digital ecosystem is also facing off one of its biggest threats to cyber...

BSIMM: Top Five Software Security Activities that Create a Better Software Security Initiative

Authored by: Taylor Armerding, Security Advocate, Synopsys Software Integrity Group For any organisation looking to improve the security of its software, Building Security In Maturity Model (BSIMM) has dozens of options. Many...

Are APIs your Weakest Security Link?

Authored By: Tim Mackey, principal security strategist, Synopsys Cybersecurity Research Center Best practices reveal how to shore up the connective tissue of a website An application programming interfaces (API) is the...

October 2021 - Patch Tuesday

Authored By: Chris Goettl, Vice President, Product Management for Security, Ivanti October is Cybersecurity Awareness Month. It is a great time to evaluate your security strategy and ensure you are focusing on key ways to...

Zero-Trust for Privacy Explained

A zero-trust approach is a cybersecurity framework or, model wherein all users, applications, devices, networks and processes are assumed to be potential attack vectors and are thus not granted automatic access to the system...

"What is CIEM"? Pronounced "Kim"

Authored By:  Morey Haber, Chief Security Officer at BeyondTrust   Cloud Infrastructure Entitlement Management (CIEM but pronounced “Kim”) is the next generation of Privileged Access Management (PAM)...

Top 10 Considerations When Evaluating a Cloud Network Security Solution

Authored By: Jonathan Maresky, Cloud Product Marketing Manager, at Check Point Software Technologies Cloud security has become business-critical as organisations expand and deepen their cloud presence. According to...

Data Protection and Security: Crucial to Business Sustainability

Authored By: Fred Kost, Global Vice President Cross Platform, Security and Analytics at Oracle Today, cyberattacks pose one of the most daunting challenges any business may experience.    A new study from the...

How to Cyber Security: Butter Knives and Light Sabres

Authored By: Jonathan Knudsen, Senior Security Strategist, Synopsys Software Integrity Group Psychologist Abraham Maslow wrote, in 1964, “Give a small boy a hammer, and he will find that everything he encounters needs...