Polaris and partners: Avengers assemble!

Polaris and partners: Avengers assemble!

| | General
Synopsys partners with an extensive team to help all our customers build secure, high-quality software faster. Meet the latest superhero: the Polaris platform. The excitement from the Feb. 25 announcement of the ...
The days (and nights) of an ‘always on’ sales engineer

The days (and nights) of an ‘always on’ sales engineer

| | General
Being an IT sales engineer isn’t as glamorous as it seems—but the satisfaction of solving customer problems and performing well under pressure is unmatched. When it comes to most jobs, there’s the ...
At RSA, it is clear encryption divide is as wide as ever

At RSA, it is clear encryption divide is as wide as ever

| | FEATURED, General
Selective encryption backdoors don’t work; the laws of mathematics don’t know or care who you are. But the concept was still under intense debate at RSA 2019. The war on, and about, ...

Two-Factor Authentication (2FA) is Just One Part of a Layered Phishing Defense

Staying ahead of phishing attacks is, and likely will always be, an uphill battle. ... The post Two-Factor Authentication (2FA) is Just One Part of a Layered Phishing Defense appeared first on ...
The Complete Application Security Checklist

The Complete Application Security Checklist

| | General
Our Complete Application Security Checklist describes 11 best practices you’ll want to implement to minimize your risk from cyber attacks and protect your data. Enterprise application security is a crowded, confusing field ...

10 Steps Every Organization Should Take to Improve Cybersecurity

In a recent blog post – 9 Reasons Cyberattacks are So Successful – we ... The post 10 Steps Every Organization Should Take to Improve Cybersecurity appeared first on SlashNext ...

Protecting Against the Phishing Attack Blind Spot – Are you Prepared?

In a recent SlashNext-sponsored Osterman Research whitepaper – Addressing the Key Cybersecurity Issues Organizations ... The post Protecting Against the Phishing Attack Blind Spot – Are you Prepared? appeared first on SlashNext ...
browser credential

5 Phishing Attacks that Do Not Involve Email Scams

Research conducted by the Ponemon Institute suggest that 77 percent of today’s phishing attacks ... The post 5 Phishing Attacks that Do Not Involve Email Scams appeared first on SlashNext ...
The 10 most-read Software Integrity Blog posts from 2018

The 10 most-read Software Integrity Blog posts from 2018

| | General
Our 10 most popular posts from 2018 show clear trends in software security topics of interests, including DevSecOps, CI/CD, open source, blockchain, and GDPR. 1. What’s the difference between agile, CI/CD, and ...
9 highlights from the 2018 Software Integrity Blog

9 highlights from the 2018 Software Integrity Blog

| | General
From vulnerability detection to API security, these nine topics hit the highlights from our coverage of software security and quality this year. 1. The year 2017 broke records for the number of ...
Loading...