Strengthening Security in Distributed Payment Systems: Exploring Innovative Solutions

Building on our previous discussion about the pivotal role of Trusted Platform Modules (TPMs) in... The post Strengthening Security in Distributed Payment Systems: Exploring Innovative Solutions appeared first on Entrust Blog ...

Market Forces vs. Regulation: How to Drive IT Product Safety

| | Live Webinars
Over the past 50 years, traveling in automobiles has become much safer. Part of this is due to government regulations and part due to market forces. Given the criticality of enterprise IT ...
Implications of AI for Corporate Security

Implications of AI for Corporate Security

| | article
On February 29, I was honored to serve as the moderator for a panel on “The Rise of AI and its Impact on Corporate Security” at the 2024 Ontic Summit. The panel not ...
csi-driver-integration-cover-2

Enhancing Kubernetes Secrets Management with Akeyless and CSI Driver Integration

| | Product updates, SBN News
Explore how Akeyless Vaultless Secrets Management integrates with the Kubernetes Secrets Store CSI Driver to enhance security and streamline secrets management in your Kubernetes environment. The post Enhancing Kubernetes Secrets Management with ...

Guarding Education: The Impact of Compromised Credentials

The education sector has increasingly become a target for cybercriminals seeking to exploit vulnerabilities and gain unauthorized access to sensitive information. The post Guarding Education: The Impact of Compromised Credentials appeared first ...

A(nother) Ransomware Saga with a Twist

The healthcare sector has once again found itself at the center of a storm. On February 21, Change Healthcare, a titan in healthcare support services, suffered a devastating cyberattack by the notorious ...

DataDome Achieves AWS Retail Software Competency: Securing the Future of Retail

The AWS Retail Software Competency highlights DataDome's commitment to build innovative protections specifically for the retail sector ...
10 Must-Have Elements for an Air-Tight IT Security Policy

10 Must-Have Elements for an Air-Tight IT Security Policy

| | articles
In 2023, data security faced an uphill battle against cyberattacks, and the risks of becoming a victim grew stronger.  There was a shocking 600% surge in cybercrime, with the average breach costing ...
Roles of the internal compliance audit process

How to Conduct an Internal Audit: A Comprehensive Guide

In today’s digital age, external compliance audits and third-party attestations (e.g., SOC 2) have become increasingly crucial in B2B purchase decisions. Not only do they provide an objective third-party verification of a ...
SBOM, VDR, and Maven: Transforming the Apache Logging experience to a common pattern

SBOM, VDR, and Maven: Transforming the Apache Logging experience to a common pattern

In late 2023, a few members of the Apache Logging Services project – known for providing the famous Log4j logging framework – received funding from the Sovereign Tech Fund (STF) to enhance ...