Author user photo

Did Open Source Software Fail Us?

Mike Rozlog, CEO - dBase

Here are five steps to avoid risks and ensure open source does not fail your organization.

Author user photo

Who Has a Copy of Your Software?

Mike Rozlog, CEO - dBase

What processes and procedures should companies have in place on what is being built or produced to protect against unauthorized source code access?

Author user photo

Detecting Open Source Security Vulnerabilities with Managed Open Source Governance

Lacey Thoms, Marketing Specialist - Protecode

Here is helpful information for when your company encounters open source security vulnerabilities in your code.

Author user photo

Cloud Privacy vs. Security: What’s the Difference?

Pejman Roshan, VP, Product Management - ShoreTel

Hackers will always find a way to keep pace with technological developments, but there are solutions to make sure business continues.

Author user photo

Closing the Human Behavior Gap in IT Security Monitoring

Gaby Friedlander, Co-Founder and CTO - ObserveIT

User activity monitoring software provides protection from threats that come from within an organization and contracted vendors with malevolent intentions.