Back to blog

Eyal Katz

The Developer's Checklist to Security Hardening

The Developer’s Checklist to Security Hardening [XLS Download]

The coming of the internet was a beautiful thing, bringing about accessibility to reach everyone across the globe. But this reach is a double-edged sword. If

What is OS Hardening and How Can Developers Implement it

What is OS Hardening and How Can Developers Implement it

As cyber threats become increasingly advanced and complex, organizations are forced to adopt a military attitude of ‘war footing’ to secure their systems and servers. Although

6 Steps for Success with CI/CD Security Hardening

6 Steps for Success with CI/CD Security Hardening

Rapid digitalization and increasing remote business operations place a significant burden on developers, who are continuously pressured to push out software faster. As a result, CI/CD

Top 5 IAST Tools

Top 5 IAST Tools for 2022

The trouble with allowing developers to deploy code directly to production is that security threats are often overlooked in the process. These vulnerabilities only show up

3 Steps To Remain PCI Compliant with your AWS Configuration

3 Steps To Remain PCI Compliant with your AWS Configuration

Becoming and staying PCI compliant both take a lot of work. Developers are often already swamped with an endless list of tasks, and adding PCI compliance

Web Application Security: What to Consider for 2023

Web Application Security: What to Consider for 2023

Security is the biggest threat facing organizations that strive for faster software delivery. Organizations are witnessing increasing attacks due to application code gaps and security weaknesses.

how to prevent secrets sprawl

5 Ways to Prevent Secrets Sprawl

The number of secrets exposed in public repositories is staggering. With reports in 2021 reaching up to 6 million secrets detected, an increase of 50% from

solr vs elasticsearch

SOLR vs. Elasticsearch: What’s the best search engine for 2022?

While modern businesses depend on data to stay ahead of the competition, data alone isn’t enough. They also need efficient search engines to quickly index and

Top 10 Cyber Threat Intelligence Tools for 2022

Top 10 Cyber Threat Intelligence Tools for 2022

Cyber threat is soaring on the list of the gravest challenges plaguing organizations today. This is partly an outcome of developers including security in their development

Stop leaks at the source!