Effective Tools for Software Composition Analysis

Because companies are defined by their customers, we connected with IT Central Station for real user experiences with Sonatype’s Nexus Lifecycle and Nexus Firewall. Our second in the series, we first looked at benefits of data quality to Software … Continue reading Effective Tools for Software Composition Analysis

Katie Arrington discusses making development move at the speed of relevance

Historically, the advent of Agile development increased the ability of software developers to create apps that met real-time objectives. Then, the rise of DevOps pushed for coordinated efforts between developers and operations by moving operations… Continue reading Katie Arrington discusses making development move at the speed of relevance

Sonatype CEO on The Future of the Software Supply Chain

As CEO of Sonatype for the past ten years Wayne Jackson has a rich perspective on where software development, and where it intersects with security, is heading. As he noted during an interview with Sonatype’s CMO Matt Howard during the company’s 2… Continue reading Sonatype CEO on The Future of the Software Supply Chain

Controlling Physical Security via the Cloud

A cloud-based physical access control system merges user identities between your physical and digital environments by integrating with your central directory.
The post Controlling Physical Security via the Cloud appeared first on JumpCloud.
The post C… Continue reading Controlling Physical Security via the Cloud

How Cloud Computing Has Impacted Cybersecurity

Cloud computing involves storing data and programs on remote servers and accessing the same via the internet. Cloud computing eliminates the need for having on-site servers and backup systems as all the data can be accessed from different terminals at…. Continue reading How Cloud Computing Has Impacted Cybersecurity

Ransomware: Is Cloud Technology the Answer to This Threat?

Contrary to popular belief, ransomware is not a new concept. Its first ever iteration came about back in 1991, a.k.a. almost two decades ago, when the Internet was still in its incipient stage. It was known as PC Cyborg, and…Read more
The post Ransom… Continue reading Ransomware: Is Cloud Technology the Answer to This Threat?

Protecting Yourself from Identity Theft by Preventing DNS Leaks

What Is Identity Theft Exactly? Identity theft is a term that is used to refer to any kind of scam, deception or an activity that leads to loss of your personal data, including loss of passwords, username, credit card details,…Read more
The post Prot… Continue reading Protecting Yourself from Identity Theft by Preventing DNS Leaks

Seven Ways to Protect Yourself against Cryptojacking

As netizens [citizens of the web – ], you probably know about computer viruses and hacking incidents. The new technology and market development have contributed to new forms of cyber-attacks and cryptojacking is one of them. These are often more…. Continue reading Seven Ways to Protect Yourself against Cryptojacking