Executives drive the most sensitive and confidential discussions within your business. So, it’s sobering to think that many of the work processes today are still organized and built around email, paper documents and insecure messaging and file sharing services in many Fortune 1000 companies. These conversations are often extended to board members - external parties to the organization and outside the corporate firewall.
As of today, security is a hot topic for not just IT industry but almost everyone. From personal mail accounts to data encryption, everyone has something valuable to protect. When we ‘protect’ something, we build a physical and/or virtual system that hinders any unauthorized viewers and users.
We’re proud to announce a new USM Anywhere App for Box! We use the Box Events API to track and detect detailed activity on Box. This new addition to the set of USM Apps arrives to provide an extra security layer to cloud storage services that many enterprises are outsourcing to Box. Beyond monitoring and data collection, USM offers early detection of critical events and alerting, thanks to event correlation and business intelligence.
In the cybersecurity world, testing for the existence of exploitable vulnerabilities isn’t always an exact science. Checking for open ports (CIS Control 9 - Limitation and Control of Network Ports, Protocols and Services) sounds simple enough, but the reality is a long way off.
All companies must close their books at the end of every quarter and fiscal year. Historically that’s been a painful, time-consuming process. Help is on the way with ServiceNow® Finance Close Automation, recently previewed during the Knowledge 2019 keynotes in Las Vegas. We also held breakout presentations on the conference show floor to discuss this new technology, which will be available in our next product release – New York – in the third quarter of 2019. So, what is it and what does it do?
A selection of this week’s more interesting vulnerability disclosures and cyber security news. An article that prompts many questions regarding use of PII in a passive way, misses one obvious question: Why was Wi-Fi enabled on 5.9 million devices while in transit? When you next get a moment, just check what, and why you need Wi-Fi and other communications features enabled all the time.
In a recent post, we talked about Docker containers, and what you should know about them. Hopefully we cleared up any confusion you might have had about the Docker ecosystem. Perhaps with all that talk, it got you thinking about trying it out on one of your own applications? Well in this post we’d like to show you how easy it is to take your existing Ruby on Rails applications and run them inside a container.