Styra

Styra Adds Declarative Tool to Generate Authorization Policies

Styra this week launched a declarative tool that enables cybersecurity teams to generate authorization policies that can be implemented programmatically by a DevOps team. Company CEO Bill Mann said Rego Policy Builder ...
Security Boulevard

DevSecOps Delivered: Automated GitHub Pull Requests

In this episode of DevSecOps Delivered, we demonstrate how to use the Github automated pull requests integration in Nexus Lifecycle. You'll learn: How the Jenkins integration works How source control management (SCM) ...
IP Reputation Scores: Additional Security for SMBs

IP Reputation Scores: Additional Security for SMBs

Cybercriminals continue to find new ways toto deliver malware, DDoS and other attacks. These attacks can have substantial consequences for businesses and their stolen customer data. But what can small businesses and ...

How to Prevent Insider Data Breaches at your Business

Guest article by Dan Baker of SecureTeamMajority of security systems are installed to try and forestall any external threats to a business’ network, but what about the security threats that are inside ...
Third Party Security Risks to Consider and Manage

Third Party Security Risks to Consider and Manage

Guest article by Josh Lefkowitz, CEO of Flashpoint Acceptable business risks must be managed, and none more so than those associated with external vendors who often have intimate access to infrastructure or ...
All I want for Christmas: A CISO's Wishlist!

All I want for Christmas: A CISO’s Wishlist!

As Christmas fast approaches, CISOs and cyber security experts around the world are busy putting plans in place for 2019 and reflecting on what could have been done differently this year. The ...
Customer Q&A: GMEDES Finds Cloud Alternative to AD

Customer Q&A: GMEDES Finds Cloud Alternative to AD

When Azure® Active Directory® was released, many IT admins thought they would finally be able to move Active Directory to the cloud. Unfortunately, this hasn’t been the case. IT admins are not ...
Mac® Management Policies

Mac® Management Policies

Being able to implement Mac® management policies is a key skill set in the modern IT admins’ toolbox. With more Macs cropping up in organizations than ever before, managing Mac systems has ...
How Policies with JumpCloud Work

How Policies with JumpCloud Work

Group Policy Objects (GPOs) have been a mainstay in IT for about two decades now. These policies grant intricate control over Windows machines, and are a critical tool that many admins rely ...
Cloud Directory feature macOS Device Management

Cloud Directory feature macOS® Device Management

A cloud directory that features macOS® device management would certainly be helpful in the modern enterprise. While many IT organizations have Macs®, they often don’t have great management tools for Macs. As ...