Eskenzi PR ad banner Eskenzi PR ad banner

Software

Guest Blog: Ox Security on learning from the Recent GitHub Extortion Campaigns

OX Security, the pioneer in Active Application Security Posture Management (Active ASPM), today issued the OSC&R community’s inaugural software supply chain threat report, "OSC&R in the Wild: A New Look at the Most Common Software Supply Chain Exposures." Based on a nine-month analysis of over 100 million alerts, tens of thousands of code repositories, and 140,000 real-world applications, the report is the first comprehensive analysis of the severity of vulnerabilities across the software supply kill...

Read moreDetails

Quest Software, a systems management, data protection and security software, company, has announced what it calls its latest breakthrough in data management with the launch of erwin Data Modeler by Quest 12.5. Boasting cutting-edge features that enhance data quality, governance, and stakeholder collaboration, erwin Data Modeler 12.5 drives organisations towards data democratisation, facilitating strategic efforts such as AI Large Language Model (LLM) development, data intelligence and data platform modernisation.   Driving Innovation Organisations that maintain...

Read moreDetails
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks recently announced that it was named as a “Leader” and “Outperformer” by GigaOm in the analyst firm’s Radar Report for Secure Service Access (SSA), GigaOm’s term for SASE/SSE. The report’s comprehensive review evaluates the degree to which suppliers converge security and networking into a single, global platform. Cato is only SASE provider to be ranked an SSA “Leader” and an “Outperformer” with perfect delivery of SD-WAN as well as the core network-based security...

Read moreDetails
The IT Security Guru Buyer’s Guide 2022

Cybersecurity and compliance are now essential pillars within the modern enterprise. They are integral to the business continuity and legal responsibility of every organization, large or small.  What’s more, these obligations are exponentially more complex than they were just 5 years ago. However, since these are relatively new obligations that means finding the best vendors and understanding the right services for your company can be uncharted territory for your team. With this in mind, the...

Read moreDetails
Open Source Risks Are Still A Challenge, But Organisations Are More Aware.

Synopsys, Inc. has announced the expansion of the Technology Alliance Partner (TAP) segment of the Software Integrity Group’s new Global Partner Program at RSA Conference. Synopsys is showcasing integrations between the company’s Intelligent Orchestration solution and technology partner tools, including CloudBees and GitHub Actions. With more than 40 DevOps ecosystem vendors currently engaged, the TAP program simplifies and accelerates partner integration with Intelligent Orchestration and other Synopsys application security solutions. Recognised as a leader by...

Read moreDetails

Synopsys has today announced it will showcase the Software Integrity Group’s new Intelligent Orchestration solution at RSA Conference on May 17th - 20th. Intelligent Orchestration is a dedicated application security automation pipeline, optimized for speed and efficiency, that ensures the right security tests are performed at the right time. Intelligent Orchestration, which runs in parallel to build and release pipelines, utilizes innovative technology to automatically determine and initiate the most appropriate security tests, including static (SAST),...

Read moreDetails
vulnerability

An information leakage can result in grave consequences. Consider the recent SolarWinds supply chain attack which transpired from the exposure of a critical, and inanely simple, internal password (solarwinds123). In this way, making the recent findings by the Synopsys Cybersecurity Research Center (CyRC) especially troubling. The analysis of over 3,000 popular Android mobile apps showed information leakage to be commonplace. Passwords, user credentials, email addresses and tokens are among the information found. With this information,...

Read moreDetails
Latest Version Of Synopsys’ BSIMM10 Study Highlights The Impact Of DevOps On Software Security.

As a result of a demanding market, developers have often foregone security for speed with security teams typically tagged on at the very end of the development lifecycle. This, however, is an unsustainable, if not unacceptable stance, in today’s environment. The future requires organisations to integrate security from the beginning when the application is built. They need to be able to adapt efficiently to protect new architectures as well as consistently improve on performance. Those...

Read moreDetails
Working from home laptop face mask

Digital collaboration tools have been around for years, however for a lot of businesses they have fallen under the radar until now. Since the outbreak of COVID-19, many organisations have been forced to ask their employees to work from home. This has made these tools a necessity for businesses whose activities rely on collaboration between employees. Finding the right collaborative solutions for your company depends on the unique structure and needs of your organisation. Here...

Read moreDetails

Today, Cybereason announced that it will extend its award-winning endpoint protection to include mobile devices with its new platforms Cybereason Mobile and Cybereason Mobile MDR. Cybereason Mobile aims to prevent, detect and respond to security issues, shielding customers from emerging mobile threats. With Cybereason’s second new offering, Cybereason Mobile MDR provides a managed service which gives enterprises access to a team of security analysts to counter advanced mobile threats across Android and iOs devices, day...

Read moreDetails
Page 1 of 3 1 2 3