English News

How to Manage Privileges in Endpoints?

How to Manage Privileges in Endpoints?

If you are running an organization, you should be concerned with managing endpoint privileges to ensure devices such as laptops, smartphones, and tablets do not […]
How Data Loss Protection Is Outpacing Traditional DLP

How Data Loss Protection Is Outpacing Traditional DLP

Data loss or data leak prevention (DLP) is a well-known approach for detecting and preventing the loss, leakage, or misuse of data through unauthorized access, breaches, and […]
SAP Security Patch Day June 2023

SAP Security Patch Day June 2023

Cross-Site Scripting Never Gets Old Highlights of June SAP Security Notes analysis include thirteen new and updated SAP security patches released, including four High Priority […]
What the Google SQL Flaw Tells Us About Data Access in the Cloud

What the Google SQL Flaw Tells Us About Data Access in the Cloud

Last month, we saw yet another high-profile case of cloud administrators being able to access confidential data. This time, it was a security flaw in […]
Is Secure and Trusted AI Possible? The EU Leads the Way

Is Secure and Trusted AI Possible? The EU Leads the Way

The European Union Agency for Cybersecurity (ENISA) releases 4 reports on the most far-reaching challenges in artificial intelligence (AI) on the occasion of the conference […]
China-Taiwan Tensions Spark Surge in Cyberattacks on Taiwan

China-Taiwan Tensions Spark Surge in Cyberattacks on Taiwan

Recent tensions between China and Taiwan have been escalating due to China’s increasing military presence and provocative actions in the region. China has long claimed […]
MOVEit Transfer Zero-Day Vulnerability Exploited in Data Theft Attacks

MOVEit Transfer Zero-Day Vulnerability Exploited in Data Theft Attacks

A zero-day vulnerability affecting MOVEit Transfer has been reported being actively exploited by hackers worldwide. MOVEit Transfer is a popular file transfer program developed by […]
How To Address Your Customers’ Data Security Requirements

How To Address Your Customers’ Data Security Requirements

Data protection has become a critical concern for businesses today. Company partnerships and collaborations often involve the exchange of sensitive data, making it imperative for […]
What is the role of a CISO during a cyber attack?

What is the role of a CISO during a cyber attack?

The CISO plays a crucial role in incident management during cyber attacks as they are responsible for implementing containment and eradication measures. However, it is […]
What Is Cloud Security Posture Management (CSPM) & How to Do It

What Is Cloud Security Posture Management (CSPM) & How to Do It

In this blog, we will outline the advantages of cloud security posture management, why you should adopt it, how it can help your organization identify […]
Why Adopt SOC 2? A Guide to Compliance and Its Benefits

Why Adopt SOC 2? A Guide to Compliance and Its Benefits

SOC 2 compliance is voluntary. Here’s why you might want it anyway. With the regulatory landscape growing more complex by the year, the last thing […]
The Only ERP-focused Solution in Gartner’s Application Security Magic Quadrant, 3 years in a row!

The Only ERP-focused Solution in Gartner’s Application Security Magic Quadrant, 3 years in a row!

Today, I’m proud to announce that Onapsis has once again been recognized in the Gartner® Magic Quadrant for Application Security Testing, making this the third […]
Gartner Forecasts Worldwide Government IT Spending to Grow 8% in 2023

Gartner Forecasts Worldwide Government IT Spending to Grow 8% in 2023

Governments Are Increasing Digital investments in Response to Global Turmoil Worldwide government IT spending is forecast to total $589.8 billion in 2023, an increase of […]
Why Preparation for Quantum Computing Starts Now

Why Preparation for Quantum Computing Starts Now

Once considered unbreakable, today’s encryption algorithms could be vulnerable. Here’s how enterprises can become quantum resistant. When AI bots went mainstream this year, there was […]
Gartner Identifies 12 Actions to Improve Data Quality

Gartner Identifies 12 Actions to Improve Data Quality

Gartner Analysts Are Exploring Data Trust, Governance and Privacy at the Gartner Data & Analytics Summit, 22-24 May, in London, UK Gartner, Inc. identified 12 […]
The Top Five Data Security Risks in Manufacturing

The Top Five Data Security Risks in Manufacturing

We might not think of factories as repositories of sensitive information, but increasingly they are. From superconductors to sunflower oil, the goods made in production […]