Don't miss out on any insight. Subscribe to stay in the loop about our exclusive content.
Don't miss out on any insight. Subscribe to stay in the loop about our exclusive content.
Blog
Importance of Security Audits in Software Projects for Robust Application Security
This article explores the vital role of implementing ASVS in software projects, highlighting its ...
Blog
What is Differential Privacy and How Does it Work?
Organizations need to access useful information about users or consumers while protecting their ...
Blog
When is Blockchain an appropriate solution?
Blockchain’s properties related to security and integrity can open multiple new use cases. But, is ...
Blog
How to identify and treat data leakage
An important pitfall to avoid when designing production-grade machine learning systems is called ...
Blog
Web Proxy Tools (Fiddler and Charles)
Almost every application these days communicates over HTTP: websites, RESTful services, and even ...
Blog
API Security: What it is and Why it Matters
Cybersecurity threats are on the rise in general and with APIs specifically. Because organizations ...
Blog
Open XDR and the Future of Cybersecurity
When “X” means everything. Aimei Wei is the Founder and VP of Engineering at Stellar Cyber. She has ...
Blog
Turning Software Developers into Security Heros
How security products can be force multipliers that help us to deliver faster to production. Shira ...
Blog
5 Security Solutions Responding to Work-from-home and the Explosion of Endpoints
The COVID-19 pandemic drove organizations to adapt and support remote operations. The distributed ...
Blog
The Emerging Policies and Regulatory Frameworks Shaping Cybersecurity
Cybersecurity and data privacy regulations vary widely depending on the industry and geographic ...
Blog
DevSecOps: Benefits and Implementation
Organizations are reducing development challenges caused by the shortage in specialized ...
Blog
Who Is Responsible for Cloud Security and Compliance?
Mitigating the Risks of Unauthorized Access and Data Breaches
Blog
Developers and Security: A Love/Hate Relationship | Yasyf Mohamedali
In this DojoLive! interview Yasyf Mohamedali, CEO of Sym, describes the relationship between ...
Blog
Building Secure Docker Images
Normally, when we begin to develop microservices and build our Docker images, we use Dockerfiles by ...
Blog
Centrally manage your AWS WAF rules setup
In the previous blog, we shared how you can secure your web applications, portals and API’s with ...
Blog
Web Application Security Using AWS WAF and AWS Shield
Estimated reading time: 6 minutes This post was last updated on 3 September 2019. As a modern ...