‘The Operators’: Experts from Airbnb and Carta on building and managing your company’s customer support

Airbnb’s Global Product Director of Customer and Community Support, and Carta’s Head of Enterprise Relationship Management share how companies should be thinking about customer service. Continue reading ‘The Operators’: Experts from Airbnb and Carta on building and managing your company’s customer support

How a Surf Loving Aussie Developed Sonatype’s Most Popular Extension

The first thing you need to know about Sonatype is this: the rumors are true.
The post How a Surf Loving Aussie Developed Sonatype’s Most Popular Extension appeared first on Security Boulevard.
Continue reading How a Surf Loving Aussie Developed Sonatype’s Most Popular Extension

Automated Third-Party Security Lifecycle Management Innovator Panorays Collaborates with Shared Assessments to Deliver Comprehensive Risk Evaluation

Customers Now Rely on Panorays to Reduce the Time Spent on Standardized Information Gathering (SIG) Responses
The post Automated Third-Party Security Lifecycle Management Innovator Panorays Collaborates with Shared Assessments to Deliver Comprehen… Continue reading Automated Third-Party Security Lifecycle Management Innovator Panorays Collaborates with Shared Assessments to Deliver Comprehensive Risk Evaluation

Repository Management: An Easy Way to Minimize Risk

You’re probably familiar with JVM, or the Java Virtual Machine. It’s a standard diagnostic interface used to test Java software; so standard, in fact, that Mykel Alvis (@mykelalvis) of Array Consulting urges developers to think beyond its testing … Continue reading Repository Management: An Easy Way to Minimize Risk

Anonymous Access In Nexus Repository is Not A Zero-Day Vulnerability

In March, a researcher from Twistlock contacted us about two issues he identified, stemming from user access settings. As with any disclosure, we immediately looked into it. 
The post Anonymous Access In Nexus Repository is Not A Zero-Day Vul… Continue reading Anonymous Access In Nexus Repository is Not A Zero-Day Vulnerability

New in Repo – Repository Routing Helps Protect Against Dependency Hijacking Attacks

Nexus Repository Manager 3.17 introduces a new feature that allows organizations to better protect their supply chain dependencies against hijacking attacks. This new feature, known as Repository Routing, allows an administrator of a Nexus Reposit… Continue reading New in Repo – Repository Routing Helps Protect Against Dependency Hijacking Attacks

Panorays Unveils New Tools for Auto Discovery of Third and Nth Parties and Geolocation of Digital Assets

One Click Automatically Displays Corporate Assets of Third-Party Vendors
The post Panorays Unveils New Tools for Auto Discovery of Third and Nth Parties and Geolocation of Digital Assets appeared first on Security Boulevard.
Continue reading Panorays Unveils New Tools for Auto Discovery of Third and Nth Parties and Geolocation of Digital Assets

Advanced Prevention + Embedded EDR: The Next Generation of Protection with microsoft Defender ATP and Morphisec

When looking at cyber defense best practices and models, one driving question, which also keeps CISOs up at night, is this:
What’s the best way to orchestrate security telemetry and processes so that SOC operators and security teams can prevent m… Continue reading Advanced Prevention + Embedded EDR: The Next Generation of Protection with microsoft Defender ATP and Morphisec