Blog
What is code-to-cloud security intelligence?
November 15, 2023
0 Comment
By Ankur Shah
Securing applications can only be achieved with a platform approach where developers and security teams share the same single source of truth. In the last decade, the technology industry experienced a massive shift toward the cloud where every company no matter the industry developed and deployed cloud-native applications. This pace
Five Ways To Use Cybersecurity To Build Your Digital Trust
November 15, 2023
0 Comment
By Przemek Szleter
Digital trust became a hot topic with progressing digitization. A Check Point report (via Infosecurity Magazine) found that in the first quarter of 2023, the global incidence of cyberattacks increased by 7% compared to the same time a year before. Although cybersecurity spending dropped significantly during the 2022–2023 budget cycle, partly due to
By Shannon Cook
Cyber-attacks are on the rise in the digital era—here is what business leaders need to know about navigating cyber security Cyber-attacks happen every 39 seconds worldwide. While such attacks were once considered the sole concern of IT or specialized tech departments, the surge in malicious incidents means that business leaders need to
The increasing impact of Artificial Intelligence on cybersecurity
November 14, 2023
0 Comment
By Anthony Daniel
If asked to name the current hottest topic in the IT industry, few people would answer anything but artificial intelligence (AI). In less than 12 months, AI has evolved from a technology understood only by IT professionals to a tool used by everyone from schoolchildren to writers, coders, and artists.
How this malware bypasses Android security mechanisms
November 10, 2023
0 Comment
By Daniel Casil
A dangerous malware has managed to bypass the security mechanisms put in place by Google with Android 13. Called SecuriDropper, this virus imitates the behavior of an application from the Play Store to be able to install spyware or malware designed to steal your account in the bank. Computer security researchers at ThreatFabric have discovered