The xSPM Trend: Security Posture Management for Everything
The xSPM trend represents a holistic approach to managing and enhancing the security posture of diverse IT assets ...
The Role of XBOMs in Supporting Cybersecurity
SBOMs aren’t the only bills of materials that are necessary for the protection of your tech stack. XBOMs are growing in importance ...
Adopting CNAPP as a Bridge Between DevOps and Cloud-Native Security
A CNAPP can infuse security into DevOps workflows while paying close attention to the unique needs of cloud-native applications ...
Managing a World-Class Security Program in a Recession
As signs of a global recession continue to pile up, many businesses are tightening their spending across the board. Though cybersecurity remains a critical concern for virtually every type of organization, even ...
The Cloud Security Risks of Overprivileged Vendors
Onboarding new software and SaaS vendors in the cloud presents a new set of security challenges for a lot of organizations ...
Don’t Trust the Security of the Software Supply Chain
Now more than ever, organizations are relying on the supply chain for basic business operations. According to Charlie Jones, director of product management with ReversingLabs, there are two reasons for this: The ...
Making SaaS Compliance Easy with Automated Report Generation
Compliance is hard. It’s an arduous, manual, cost-prohibitive process that often takes months, if not years, to achieve for organizations in financial services, insurance, healthcare, and other highly regulated industries. Today, we ...
Not Just Web Browsing Security: Isolation Strengthens all SSE Functions
Over a decade ago, the National Nuclear Security Administration began using “remote-managed hosted virtualization” to isolate risky web interactions from laboratory desktops used in nuclear research labs. This early version of remote ...
Cybersecurity Woes, Lax Patching Puts Media Companies At Risk
The secure production, distribution and management of media is being threatened by a complex, fragmented third-party ecosystem leaving the media industry exposed to potential cybersecurity threats, a survey by BlueVoyant found. The report ...
API Security: A Complete Guide
We as consumers may not realize it, but APIs have revolutionized how we live and work, driving innovation and making it easier to use software in our day-to-day lives. Our society has ...