Jan 4, 2023 | Recent News
It’s 2023 and the world of application development is slowly but surely migrating from DevOps to DevSecOps. As you probably know, DevSecOps “automates the integration of security at every phase of the software development lifecycle, from initial design through...
Dec 21, 2022 | Press Release, Recent News
As the year ends, Security magazine spotlights cybersecurity solutions released in 2022. Covering everything from insider risk mitigation to improved threat monitoring, we spotlight innovative cybersecurity products and technology that can help enterprise security...
Feb 6, 2020 | Attack Surface Analysis, IoT Cybersecurity, Risk Management, Security
Making the decision to stay at a hotel involves a high level of trust. With the advent of Wi-Fi and IoT-embedded devices, e.g. televisions and refrigerators, today’s hotels need to protect their guest’s data security just as they do their physical belongings. It is no...
Jan 2, 2020 | API Security, AWS, Cloud security, Threat Modeling
Organizations migrating to a public cloud often face the same challenge: a major architectural variation between various base components such as monitoring and storage. VMware Cloud on AWS (Amazon Web Services) is committed to delivering steady software defined data...
Dec 24, 2019 | Cyber Risk, Risk Management, Security
5G structures are the next step in the development of mobile networking. We are about to embark on a next generation system level that emboldens mobile communications with trials and ongoing scale sales. The fifth generation wireless system (5G) seeks to give...