An Integrated Platform Approach to Cloud Security

An Integrated Platform Approach to Cloud Security

Organizations need to implement an integrated platform approach to address the various issues that highly distributed cloud environments may introduce.  As more and more enterprises embrace multi-cloud, they need solutions that can connect and secure these complex...
How Apple plans to monitor users

How Apple plans to monitor users

Apple plans to use its new CSAM Detection system to monitor users and identify those who store child pornography on their devices. In early August 2021, Apple unveiled its new system for identifying photos containing images of child abuse. Although Apple’s motives —...
Behind the jargon: False negatives in application security

Behind the jargon: False negatives in application security

Looking at research into web security testing, you will see a lot of talk about reducing false positives – but occasionally, you may also see the term “false negative”. Let’s cut through the jargon to see what false negatives are, what they mean for accuracy and...