Search results: IT security

Legit Security Named in the 2024 Gartner® Emerging Tech Impact Radar: Cloud-Native Platforms report

Legit Security Named in the 2024 Gartner® Emerging Tech Impact Radar: Cloud-Native Platforms report

| | AppSec
Legit Security Named a Sample Vendor for Software Supply Chain Security in the 2024 Gartner® Emerging Tech Impact Radar: Cloud-Native Platforms report ...
SEC incident response C-Suite-Data-Breach

SEC Cyber Incident Reporting Rules Pressure IT Security Leaders

As the SEC gets tough on businesses' cybersecurity posture, IT security leaders will need to beef up incident response plans ...
Security Boulevard
A Solutions Architect's Perspective: Why Legit Security is a game changer in Cybersecurity

A Solutions Architect’s Perspective: Why Legit Security is a game changer in Cybersecurity

| | AppSec, DEVOPS, Explainers
In the many years that I’ve been a Solutions Engineer in the field of application security, I've encountered many challenges that businesses face in protecting their software. It's a complex world out ...
BlackCloak: Freezing Credit vs Creating a Fraud Alert

Navigating Credit Security: The Difference Between Freezing Credit and Creating a Fraud Alert

In the aftermath of a data breach or in the face of identity theft, one of the most important steps to protect your financial wellbeing is to take the right action with ...

Securing Linux Networks: A Checklist for IT Security Teams

As Linux is used everywhere, from servers to embedded systems, mobile devices, and critical infrastructures, it is a prime target for attackers. Given this unfortunate reality, IT security teams must work diligently ...

Securing AlmaLinux: A Practical Guide for IT Security Teams

For IT security teams, transitioning from one Linux distribution to another is often a nuanced task requiring careful planning and execution. As CentOS shifts its focus to CentOS Stream, AlmaLinux emerges as ...
AI, cyber GRC, Microsoft AI cybersecurity

AI Poses Challenges, Opportunities for IT Security Leaders

Organizations are keen to deploy AI for new revenue growth and productivity initiatives, but threat actors are also ramping up on generative AI-powered attacks ...
Security Boulevard

Heartbleed Vulnerability and Risk Compliance: Key Implications for IT Security Teams

The Heartbleed vulnerability, which came to light in April 2014, had significant implications for IT risk compliance and exposed the vulnerabilities within many organizations’ security infrastructures. We have already discussed the Heartbleed ...
Legit Security and CrowdStrike: Securing Applications from Code Creation to Cloud Deployment

Legit Security and CrowdStrike: Securing Applications from Code Creation to Cloud Deployment

| | AppSec, integration, Legit
Cloud environments and the applications running on them present an enormous attack surface that’s frequently exploited. Protecting runtime environments in the cloud is certainly a top concern for any CISO, but solutions ...

Overshadowed Episode 5: Managing risk vs. friction in IT security

|
Nudge Security CEO Russ Spitler welcomes Malcolm Harkins to discuss the balance of risk vs. friction that must be considered when designing a security program ...