Author user photo

Who Has a Copy of Your Software?

Mike Rozlog, CEO - dBase

What processes and procedures should companies have in place on what is being built or produced to protect against unauthorized source code access?

Author user photo

Detecting Open Source Security Vulnerabilities with Managed Open Source Governance

Lacey Thoms, Marketing Specialist - Protecode

Here is helpful information for when your company encounters open source security vulnerabilities in your code.

Author user photo

Cloud Privacy vs. Security: What’s the Difference?

Pejman Roshan, VP, Product Management - ShoreTel

Hackers will always find a way to keep pace with technological developments, but there are solutions to make sure business continues.

Author user photo

Closing the Human Behavior Gap in IT Security Monitoring

Gaby Friedlander, Co-Founder and CTO - ObserveIT

User activity monitoring software provides protection from threats that come from within an organization and contracted vendors with malevolent intentions.

Author user photo

The New Odd Couple: Five Steps to Ensure Internal Zen with CMO and CIO

Kim DeCarlis, Chief Marketing Officer - BMC

In a typical enterprise organization, the CIO and CMO live at opposite ends of the spectrum, but this is changing. Here’s advice for achieving a complementary and mutually beneficial relationship.