Sponsor Content news, articles & updates| SC Media

Sponsor Content

Watch Now: Proactive cybersecurity thwarts bleeding edge threat trends

In this installment of SC Media’s InFocus video series, CyberRisk Alliance’s Marcos Colon, Director of Digital Community and Content Development, talks with FortiGuard Labs’ Derek Manky about what to look for in cyber threat trends today, those upcoming in 2021, and beyond. He discusses threats surrounding the COVID-19 pandemic; overall threats to the healthcare, manufacturing…

Managing the competing demands of development velocity and application security

Nearly half of the respondents to the Modern Application Development Security Survey, conducted by Enterprise Strategy Group (ESG), state their organizations regularly push vulnerable code to production. Not surprisingly, for over half of those teams, tight delivery schedules and critical deadlines are the main contributing factor. In the presence of a deadline, what can be…

Put the Sec in DevOps with intelligent orchestration

Modern software development is more of everything: more code, in more languages, on more platforms, with more deployment options. DevOps demands automation to maximize velocity and continuous improvement throughout the process feedback. All this more also brings more security risk. More code and more complexity mean more places where things can go wrong. More velocity…

Meet your shared security responsibility on AWS with CIS

In late 2019, Gartner forecasted that cloud revenue will grow 17% from 2019 to 2020. Cloud consumption drastically changed in early 2020 when the workforce rapidly went remote. According to Flexera, 59% of enterprises expect cloud usage to exceed prior plans due to COVID-19. With the increase in cloud computing, cloud security is more important than…

Watch: actionable threat intelligence

Derek Manky from Fortinet’s FortiGuard Labs looks at how to create a top-down approach to threat intelligence that produces actionable intelligence for CISOs. While legacy threats still exist, new threats are launched every day. This video looks at how CISOs can respond more quickly to the changing face of threats. If the current pandemic has…

Threat intelligence starts with strong relationships

The availability of reliable and actionable threat intelligence is essential for any effective security strategy. Security tools not only need to be able to gather threat intelligence from the places in the network they have been deployed, but they also need to be able to share and correlate that intelligence across and between all other…

Tracking the cutting edge of software security initiatives

The Building Security In Maturity Model (BSIMM)—the annual report on the evolution of software security initiatives (SSIs)—is gaining some maturity . The latest report, which went public on September 15, is the 11th iteration. The BSIMM is a real-world view of application security activities on which organizations are spending time and money. Here are some…

Next post in Sponsor Content