Systems | Development | Analytics | API | Testing

Security

The Case for Open Source IAM

Current estimates suggest widespread adoption of open source software (OSS) in organizations worldwide. Compared to sectors such as operating systems and big data, adoption in the security and identity management sector has been low until now. While there were a number of open source projects around libraries for security and identity management-related functionalities, there were only a few projects based on an end-to-end security or identity and access management (IAM) solution.

Monitoring Appian with Appian: Automating Threat Analysis and Information Gathering

In our previous blog posts covering our in-house Security Orchestration, Automation & Response (SOAR) application, we described the basic building blocks for the system and the steps we took to orchestrate interactions between a number of security tools. While building orchestration, we already introduced a significant amount of Automation powering features like threat intelligence collection and event polling.

Playing Offense Against Ransomware with a Modern Data Infrastructure

Has your company faced a ransomware attack yet? If not, count yourself lucky, for now. A June 2021 article in Cybersecurity Ventures predicts that ransomware will cost its victims approximately $265 billion annually by 2031. And, according to CRN, “Victims of the 10 biggest cyber and ransomware attacks of 2021 were hit with ransom demands totaling nearly $320 million.”

SCA Automotive With the Power of Perforce

What is static code analysis like for automotive with the Power of Perforce? Find out! Perforce static code analysis tools — Helix QAC and Klocwork — have been trusted for over 30 years by global leaders in safety-critical industries — such as automotive, medical device, rail, aerospace, and defense — for their high accuracy and ability to quickly meet rigorous compliance requirements. Perforce SAST is known for compliance and application safety because the tools are certified for functional safety compliance by TÜV-SÜD, including ISO 26262, IEC 61508, EN 50128, IEC 60880, and IEC 62304.

Interview With Adrián Estrada - Cybernews

It’s fair to say that the pandemic has not only wreaked havoc on how individuals live their daily lives but also on how they work. The global changes led to an immediate shift to remote working and unfortunately, not all enterprises were prepared for it. Companies did not have adequate time to prepare and allocate necessary security resources to ensure strong network and device protection for employees working remotely.