What is SQL Injection? A few days ago, the Federal Bureau of Investigation (FBI)
DevOps has been introduced to increase, in particular, productivity and efficiency of the Development
Application security testing (AST) and application security posture management (ASPM) are two complementary technologies
In our previous blog “Security Expansion: From Detectors to Aggregator” we discussed the advent
Introduction In today's era, where digital transformation reigns supreme, software products play a pivotal
Have you noticed that security technology evolution has gone along two orthogonal directions: detection
Trust has always been an invaluable currency, but particularly in today's digital landscape and
“Holistic” is one of the most popular terms used across the IT industry. Almost
In my previous blog post: “Assessing Enterprise’s Posture: Not-Enough Data or Too-Much Data?” we
Before making any decision that affects an enterprise, its decision-makers should assess the enterprise's
On July 26, 2023,the United States Securities and Exchange Commission (SEC) adopted rules requiring
It is a typical (and quite naïve) belief that compliance is equivalent to security.
Of course, they are! You might find your own explanations for that narrowness of
Is risk part of security? Is security part of risk? Those two terms are
As the industry embraces digital transformation to be innovative, productive, and more efficient, it
DevOps has been introduced to increase, in particular, productivity and efficiency of the Development
Application security testing (AST) and application security posture management (ASPM) are two complementary technologies
In our previous blog “Security Expansion: From Detectors to Aggregator” we discussed the advent
Introduction In today's era, where digital transformation reigns supreme, software products play a pivotal
Have you noticed that security technology evolution has gone along two orthogonal directions: detection
“Holistic” is one of the most popular terms used across the IT industry. Almost
On July 26, 2023,the United States Securities and Exchange Commission (SEC) adopted rules requiring
It is a typical (and quite naïve) belief that compliance is equivalent to security.
Of course, they are! You might find your own explanations for that narrowness of
What is SQL Injection? A few days ago, the Federal Bureau of Investigation (FBI)
Trust has always been an invaluable currency, but particularly in today's digital landscape and
“Holistic” is one of the most popular terms used across the IT industry. Almost
In my previous blog post: “Assessing Enterprise’s Posture: Not-Enough Data or Too-Much Data?” we
Before making any decision that affects an enterprise, its decision-makers should assess the enterprise's
Of course, they are! You might find your own explanations for that narrowness of
Is risk part of security? Is security part of risk? Those two terms are
As the industry embraces digital transformation to be innovative, productive, and more efficient, it