4 min read
    0

    Identity Governance and Administration is a Team Sport

    Like team sports such as football, successful identity governance requires participation and follow-through from several vital participants.
    by   in CyberRes
    5 min read
    0

    ISO 31700 and Privacy by Design: What You Need to Know

    Privacy by design is a concept that places privacy requirements in the design, development, and deployment of products, services and systems. Core elements contain guiding principles for collecting, using, retaining, and disclosing personal information and implementing appropriate security measures to protect that information.
    by   in CyberRes
    2 min read
    0

    Thoughts on the Data ‘Supply Chain’

    When companies collect large amounts of customer data, they create a ‘data supply chain.’ But who is looking out for data privacy concerns?
    by   in CyberRes
    2 min read
    0

    Shoring up the Software Supply Chain – Our New Webinar Shows How

    Is your software supply chain at risk? Our new AppSec blog details how Fortify by OpenText can help:
    by   in CyberRes
    6 min read
    0

    The Battle Is Not Always Outside: At Times, the Most Damaging Threat Is From Within

    The chronicles of history are filled with accounts of the mighty and powerful brought to their knees by internal threats. Don’t be a victim! See how ArcSight Intelligence with machine learning can help uncover insider threats within your organization.
    by   in CyberRes
    3 min read
    0

    Don't Let Cyber Criminals Break Your Heart or your APIs!

    Not only is web traffic ever increasing, but APIs are now driving the majority of it which can leave you open for heartache (and new attacks). Organizations not only need a sustainable way to keep up with the changing threat landscape, but a comprehensive solution that can test the breadth of API apps and account for all the complexities that exist with API security.
    by   in CyberRes
    3 min read
    0

    Reimagining Cyber Podcast: Online Dating and How Cyber Scammers are Breaking Hearts

    On this week's episode of the Reimagining Cyber podcast, hosts Stan Wisseman and Rob Aragao welcomed co-founder of Scamalytics, Dan Winchester, onto the podcast to discuss how cyber scams are breaking hearts.
    by   in CyberRes
    2 min read
    0

    Streamlining Identity Management: A Look at VINCI Energies and NetIQ

    The IT complexity that accompanies mergers and acquisitions, especially complexity related to securely managing identities, can prove to be a real headache. Companies who anticipate future acquisitions benefit from unifying identity management across organizations, such as VINCI Energies has accomplished through working with NetIQ.
    by   in CyberRes
    8 min read
    0

    Protecting Unstructured Data Requires a DLP + P Strategy

    Data Loss Prevention and Protection (DLPP) incorporates visibility, protection, automation, and governance to manage risks associated with unstructured data. Learn how DLPP is an essential building block in formalizing Zero Trust.
    by   in CyberRes
    4 min read
    1

    Adventures with Andrew

    Our next Fortify Employee Spotlight highlights Andrew Garrett. Andrew started working at Fortify in April of 2020 as a Product Marketing Manager, however it was his previous job that helped him to grow an understand the importance of#Cybersecurity.
    by   in CyberRes