patch-tuesday

March 2020 Patch Tuesday Commentary

Microsoft has resolved 115 unique common vulnerabilities and exposures, 26 of which were rated as Critical.
data-privacy-security-PII

10 Steps to Protect E-commerce Customer Information

It's critical for e-commerce companies to protect highly valuable and private customer information.
DevSecOps-security-kubernetes

Steering Toward DevSecOps: 3 Benefits of Kubernetes

Here's why Kubernetes is an effective platform to bring together development and operations for end-to-end security.

Software Security Update: December 2020 Patch Tuesday

December Patch Tuesday is the lightest of 2020. Only 58 unique CVEs were resolved, nine of which are rated as Critical.
shift left

How Good Have Developers Been at Shifting Left?

Development teams report their organizations are addressing security sooner — but does that necessarily mean they’re doing it more effectively?

OWASP Projects Advance Application Security

Developers have the opportunity to contribute to OWASP projects — and make a big impact on application security. Learn how projects are managed by OWASP and how to get involved.

CA Veracode’s Latest State of Software Security Report Finds Organizations Implementing DevSecOps Address Flaws 11x Faster Than Others

First Veracode analysis of flaw persistence finds 1 in 4 flaws remain open more than a year after discovery
cyber-security

June 2022 Security Update: Microsoft Office, Mitel, and Bluetooth Vulnerabilities

Attack vectors multiply as threat actors explore new ways into systems and to access data.

Protecting Sensitive Education Data in the Cloud

Protecting cloud-stored data can be greatly enhanced if educational organizations take the following 5 steps to protect sensitive student and employee data.

AI in Healthcare: With Great Power Comes Great Risk

Healthcare data enrichment and technology solutions providers can overcome risks with a comprehensive security program.

Software Security Update: October 2020 Patch Tuesday

Microsoft has launched the preview of its new update guide, which includes a few welcome improvements.
cyberattack-security-malware

Cyberattacks Underscore the Need for Network and Data Protection

Disaster recovery plans aren’t sufficient to protect cloud-based data against ransomware and malware attacks. Robust cyber recovery programs are required.
ransomware-security

Moving Security to the Point of Data

For security teams to ensure their data is secure, they need to adopt practices that make their data one of their best lines of defense, as opposed to the last line of defense.

June 2020 Patch Tuesday Commentary

Microsoft resolves 129 unique common vulnerabilities and exposures in June, but there are no publicly disclosed or exploited vulnerabilities to be concerned with.

How to Overcome Today’s Endemic Bad Actors and Malware Threats

Here's how a software-defined perimeter addresses the primary pain point of those who use a VPN for WFH (work from home) network access.

Most Popular