5 min read
    0

    It’s Not a Guideline, It’s a Directive: NIS2 and Log Managem…

    I recall seeing a meme on LinkedIn of a security analyst rushing into a burning building and out of all the security-related server and storage devices available to rescue, she only had time to grab one of them. The choice was a no-brainer—she ...
    by   in Cybersecurity
    2 min read
    0

    Excel Filters for the Fail

    In the space of just a few days here in the UK we have had reports of two data breaches that seem to have many similarities.  Both of these breaches involved the police and freedom of information requests (FOI) – one in Northern Ireland in...
    by   in Cybersecurity
    3 min read
    0

    Fortify Hosted: Secure DevOps in the Cloud

    Another year, another innovative AppSec solution from Fortify! Allow me to introduce you to Fortify Hosted, a virtual private cloud environment, maintained by Fortify, so users can focus on AppSec, not infrastructure. While the landscape of applicati...
    by   in Cybersecurity
    4 min read
    0

    Data Security Posture Management with Voltage Fusion Data Security…

    If you are thinking about cloud data security, you should know the term Data Security Posture Management (DSPM), coined by Gartner in 2022. DSPM is a new and improved approach to securing information in the cloud. Building your DSPM comprises several...
    by   in Cybersecurity
    2 min read
    0

    Fortify's FedRAMP Certification: Unlocking Trust and Efficiency…

    When it comes to the public sector's digital infrastructure, security is paramount. The Federal Risk and Authorization Management Program (FedRAMP) stands as the gold standard for cloud products and services, assuring stakeholders of robust secur...
    by   in Cybersecurity
    2 min read
    0

    Unleash the Power of ArcSight Intelligence and CrowdStrike Falcon…

    Are you attending Fal.Con 2023? If so, swing by the ArcSight Intelligence booth #1307 and learn how layering ArcSight Intelligence’s best in class behavior analytics on top of CrowdStrike’s rich EDR telemetry can help you detect insider t...
    by   in Cybersecurity
    2 min read
    0

    NetIQ Identity Manager: Empowering Kiabi’s International Growth…

    Rapid growth and an expansive geographic footprint often create IT challenges similar to those experienced by France’s largest fashion retail brand, Kiabi. With an active, growing user base in over 15 countries, Kiabi’s centrally-managed ...
    by   in Cybersecurity
    1 min read
    0

    Join Fortify, a Leading Application Security Platform, at Blackhat…

    Needing an application security partner to strengthen your organization's risk exposure and defend against cyber threats effectively? We are thrilled to announce that Fortify, the leading Application Security platform, will be proudly sponsoring ...
    by   in Cybersecurity
    2 min read
    0

    OpenText Cybersecurity Achieves Security Competency Status with…

    We are excited to share that OpenText Cybersecurity has achieved security competency status with Amazon Web Services (AWS) in data protection category for its flagship OpenText Voltage SecureData. This designation recognizes AWS endorsement of Volta...
    by   in Cybersecurity
    3 min read
    0

    The Mighty AppSec Migration

    Now more than ever cloud migration is a necessity to keep on top of all the threats that exist to your organization. Not only are attacks increasing in severity, but also in frequency. Making sure you have your data protected and backed up is just th...
    by   in Cybersecurity