Report: Benchmarking security gaps and privileged access

Delinea set out to understand what IT security leaders are doing to reduce the risk of a privileged account or identity-based attack. This report reveals how people close to the process feel about their progress, what obstacles stand in their way, and where they’re making investments for the future. You’ll see results across 19 countries and […]

Continue Reading

Coding session: Introduction to JavaScript fuzzing

JavaScript is widely used in backend and frontend applications that rely on trust and good user experience, including e-commerce platforms, and consumer-apps. Fuzz testing helps secure these applications against bugs and vulnerabilities that cause downtime and other security issues, such as crashes, DoS and uncaught exceptions. In this session, you will learn about: Fuzzing and […]

Continue Reading

eBook: 4 cybersecurity trends to watch in 2022

With the rapid acceleration of cloud usage and digitized systems, a host of new security concerns are likely to emerge in the new year. Growing threats around network defense, data protection and multicloud strategies are dominating the security conversation, while cybercriminals have become faster, smarter and more discreet than ever before. It’s crucial that businesses, […]

Continue Reading

Lean security 101: 3 tips for building your framework

Cobalt, Lazarus, MageCart, Evil, Revil — cybercrime syndicates spring up so fast it’s hard to keep track. Until they infiltrate your system. But you know what’s even more overwhelming than rampant cybercrime? Building your organization’s security framework. CIS, NIST, PCI DSS, HIPAA, HITrust, and the list goes on. Even if you had the resources to […]

Continue Reading

eBook: Privileged Access Management for Dummies

With so many recent high-profile breaches accomplished through the compromise of passwords on privileged accounts, it’s time all cybersecurity stakeholders got educated. This free, 24-page book, Privileged Access Management for Dummies, gives you a practical understanding of Privileged Access Management and its security implications: What is a privileged account? Where do privileged accounts reside throughout […]

Continue Reading

Find out why developers love Pentest as a Service (PtaaS)

Pentest as a Service (PtaaS) allows organizations of all sizes to manage an efficient pentest program with on-demand access to expert security talent and a modern SaaS delivery platform. With integrations into security and development tools and real-time collaboration with pentesters, PtaaS enables modern DevSecOps teams to secure their code faster. The Cobalt API gives […]

Continue Reading

Webinar: What’s trending in email security?

77% of security leaders agree that their company must increase protection for messages and documents sent via email (Forrester). What market shifts are impacting security strategies and data breaches? How are companies building customer trust and making email encryption easier to use? In this webcast Sarah Happé, Echoworx’s Director Client Engagement, and Forrester’s Senior Analyst […]

Continue Reading

Business fit report: Echoworx Email Encryption

Stop significant B2B or B2C information sharing problems with a tailored approach to encryption. The security of our data is, without question, at the top of any enterprise’s priority list. It is not just an IT problem; this is an issue that impacts all facets of business. Securing your email communication is an important part […]

Continue Reading

HP Wolf Security: A new breed of endpoint protection

Millions of employees are now working from home or in a hybrid setting. Unfortunately for cybersecurity, hackers aren’t confined to office walls. It’s time for your security to work from home, too. HP Wolf offers a new breed of endpoint protection. These security solutions are built into the hardware itself, offering: A protection-first approach Powerful […]

Continue Reading