An Integrated Platform Approach to Cloud Security

An Integrated Platform Approach to Cloud Security

Organizations need to implement an integrated platform approach to address the various issues that highly distributed cloud environments may introduce.  As more and more enterprises embrace multi-cloud, they need solutions that can connect and secure these complex...
How Apple plans to monitor users

How Apple plans to monitor users

Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices. In early August 2021, Apple unveiled its new system for identifying photos containing images of child abuse. Although Apple’s motives —...
SaaS Benefits and Why You Need SaaS Management

SaaS Benefits and Why You Need SaaS Management

SaaS Benefits and Advantages Did you know the average company is using 80 software-as-a-service (SaaS) applications? In fact, the average company now pays for 20 times more SaaS subscriptions today than it did five years ago. One of the largest SaaS benefits is its...
Behind the jargon: False negatives in application security

Behind the jargon: False negatives in application security

Looking at research into web security testing, you will see a lot of talk about reducing false positives – but occasionally, you may also see the term “false negative”. Let’s cut through the jargon to see what false negatives are, what they mean for accuracy and...
11 Biggest cyber security threats in 2021

11 Biggest cyber security threats in 2021

Cyber security threats persist and continue to emerge during the last years. By now you probably heard about phishing, but did you know about polyglot files yet? This article covers a unique insight to the 11 biggest cyber security threats in 2021. 1. Phishing meets...