Our Blog
Home / Blog
The secret to getting results, not noise, from your DAST solution
Products for dynamic application security testing (DAST) vary widely in quality and capabilities. A low-quality tool that merely ticks a box will do little to improve security and may generate more work than it saves. But a mature, high-quality solution can bring...
MetaDefender ICAP Server v4.11.1 Release
Product Overview OPSWAT MetaDefender ICAP Server v4.11.1 relaese is the Internet Content Adaptation Protocol (ICAP) interface between MetaDefender Core and any third-party ICAP client. By leveraging OPSWAT’s industry-leading technologies: Deep Content Disarm and...
IDENTIFYING WASTE IN MICROSOFT 365
The pandemic has arguably been the greatest accelerator of digital transformation, spurring a global move to remote working, and forever altering the way we work. IDENTIFYING WASTE IN MICROSOFT 365. Many organizations have risen to the challenge, adopting new...
Beware the NetSec Pretenders
The saying is “real devs (developers) ship products.” But, real DevSec (development security) teams ship secure products. Since the beginning of the pandemic, we have seen a lot of buzz about groundbreaking, “disruptive” technologies emerging and being sale into the...
Why You Need A Specialist Provider – A Single Vendor Approach Can Hinder Data Security
In this series, we’re looking at why you need a specialist provider when it comes to data classification. We’ve already look at why you need a labeling policy that reflects the way data is use around the business as well as why you need sophisticated and flexible...