policies
Check, Please! Adding up the Costs of a Financial Data Breach
Guest article by Andrea Babbs, UK General Manager at VIPREReliance on email as a fundamental function of business communication has been in place for some time. But as remote working has become ...
Styra Adds Declarative Tool to Generate Authorization Policies
Styra this week launched a declarative tool that enables cybersecurity teams to generate authorization policies that can be implemented programmatically by a DevOps team. Company CEO Bill Mann said Rego Policy Builder ...
DevSecOps Delivered: Automated GitHub Pull Requests
In this episode of DevSecOps Delivered, we demonstrate how to use the Github automated pull requests integration in Nexus Lifecycle. You'll learn: How the Jenkins integration works How source control management (SCM) ...
IP Reputation Scores: Additional Security for SMBs
Cybercriminals continue to find new ways toto deliver malware, DDoS and other attacks. These attacks can have substantial consequences for businesses and their stolen customer data. But what can small businesses and ...
How to Prevent Insider Data Breaches at your Business
Guest article by Dan Baker of SecureTeamMajority of security systems are installed to try and forestall any external threats to a business’ network, but what about the security threats that are inside ...
Third Party Security Risks to Consider and Manage
Guest article by Josh Lefkowitz, CEO of Flashpoint Acceptable business risks must be managed, and none more so than those associated with external vendors who often have intimate access to infrastructure or ...
All I want for Christmas: A CISO’s Wishlist!
As Christmas fast approaches, CISOs and cyber security experts around the world are busy putting plans in place for 2019 and reflecting on what could have been done differently this year. The ...
Customer Q&A: GMEDES Finds Cloud Alternative to AD
When Azure® Active Directory® was released, many IT admins thought they would finally be able to move Active Directory to the cloud. Unfortunately, this hasn’t been the case. IT admins are not ...
Mac® Management Policies
Being able to implement Mac® management policies is a key skill set in the modern IT admins’ toolbox. With more Macs cropping up in organizations than ever before, managing Mac systems has ...
How Policies with JumpCloud Work
Group Policy Objects (GPOs) have been a mainstay in IT for about two decades now. These policies grant intricate control over Windows machines, and are a critical tool that many admins rely ...

