software

Five lessons we learnt about GDPR in 2018

It is now over eight months since the EU’s General Data Protection Regulation (GDPR) came into force, affecting all organisations…

2 years ago

DPIAs and why every organisation needs to conduct them

  Do you know what a DPIA is? Do you need to conduct one? This blog will give you an…

2 years ago

Legacy Government Systems Vulnerable to Ransomware

Since 2015, unbridled ransomware attacks of government institutions have become a concern for the FBI, as they have begun targeting…

2 years ago

Software Monitoring for NERC CIP Compliance: Part 2

In Part 1 of this series, I walked through the background of the NERC CIP version 5 controls and outlined…

2 years ago

Software Monitoring for NERC CIP Compliance: Part 1

As organizations grappled with NERC CIP version 5, Tripwire learned along the way. In this series, I’ll cover the aspect…

2 years ago

Check Point Software to Acquire Dome9 to TransformCloud Security

Acquisition will strengthen Check Point’s position as a global leader in Cloud Security TEL AVIV, ISRAEL  —  October 24, 2018 Check Point® Software…

2 years ago

People: The Critical Element in DevSecOps

In his talk, “DevOps is Automation, DevSecOps is People,” at the 2018 Security Congress in New Orleans, Mike Shema, CISO…

2 years ago

Understand how to simplify your compliance projects with our free demonstrations

With the EU’s GDPR (General Data Protection Regulation) now in effect, many organisations need to understand what personal data they…

2 years ago

VMware Pledges to Reduce Cybersecurity Costs

VMware, at this week's VMworld 2018 conference, signaled its intention to reduce dramatically the number of products and technologies required…

2 years ago

8 Steps for a Successful DevOps Transition

Organizations stand to gain a lot from transitioning to a DevOps software development model. Switching to DevOps leads to quicker…

3 years ago