Why We Need Security Automation

Author(s):

Ross Moore, Cyber Security Support Analyst, Passageways

security automation

It’s About Time 42:54. Minutes and seconds. That’s how fast the average ransomware variant encrypts 100,000 files and locks out a user. 04:09. That’s the few minutes and seconds Lockbit could take to encrypt 53 GB of data. Take a look at the cyber threat maps at FireEye, Checkpoint, and Digital Attack Map for views … Read more

5 Best Practices for Ensuring Secure Software Deployment

Author(s):

Adam Smith, Content Writer, Contenterist

5 Best Practices for Secure Software Deployment

Security is a part of the Software Development Life Cycle (SDLC) that needs to be made a part of every cycle process, especially deployment. Secure software deployment does not start when the software is being deployed; it starts way back when the first line of code is written. Here are some secure software development best … Read more