March 17, 2020
What makes these 10 security vendors the biggest power players? We break it down. Read more â¶
8 key security considerations for protecting remote workers
Cyberspace Solarium report calls for layered cyber deterrence, defend forward strategy
Review: How ShiftLeft catches vulnerabilities during code development
6 security metrics that matter â and 4 that donât
How Visa built its own container security solution
British Red Cross takes a people-first approach to security
Eliminate The Drain On Your Corporate Headquarters Read more â¶
Many security and IT teams suddenly have to support and protect employees who must work remotely due to the COVID-19 crisis. Make sure you cover these areas. Read more â¶
DEALPOST
GoDaddy Websites + Marketing is packed with tools to help your business' site succeed. Read more â¶
The intergovernmental commission outlines the steps needed to defend the United States from modern cybersecurity threats. Read more â¶
This combination traffic analysis tool and dynamic application security testing tool works with nearly any language and CI system, is very easy to use, and integrates directly into the development process. Read more â¶
The increasingly high stakes of getting security right and growing board interest means metrics are more important than ever. But there are some metrics that are more useful than others. Read more â¶
The homegrown solution takes advantage of the native capabilities that already exist on container orchestration platforms and is primarily built on top of open-source tools and libraries. Read more â¶
The British Red Cross sees cybersecurity as critical to protecting the people it serves. Here's how they help the entire organization understand that. Read more â¶
Establishing cyber security priorities can be difficult for security practitioners and there is confusion around what to do to get the most effective protection against cyber attacks. Read more â¶