Spectral now part of Check Point’s CloudGuard to provide the industry’s most comprehensive security platform from code to cloud Read now

Back to blog

Open source security

6 Steps for Success with CI/CD Security Hardening

6 Steps for Success with CI/CD Security Hardening

Rapid digitalization and increasing remote business operations place a significant burden on developers, who are continuously pressured to push out software faster. As a result, CI/CD

Top 5 IAST Tools

Top 5 IAST Tools for 2022

The trouble with allowing developers to deploy code directly to production is that security threats are often overlooked in the process. These vulnerabilities only show up

top 12 cloud security solutions

Top 12 Cloud Security Tools for 2022

A recent survey of nearly 2,000 IT professionals found that while most (85%) enterprises believe cloud technologies are critical to innovation, only 40% actually have a security policy

The Developer’s Guide to IaC Scanning

The Developer’s Guide to IaC Scanning

IaC (infrastructure as code) is the latest tool to transform the face of IT infrastructure – in a nutshell, it means managing and provisioning infrastructure through

Top 5 NPM Vulnerability Scanners

Top 5 NPM Vulnerability Scanners

The world of software development has been rocked by JavaScript. With nearly every modern web app making extensive use of JavaScript on the front end. And

sdlc security

5 Essential Ways to Improve SDLC Security

Vulnerabilities found in application platforms and third-party libraries have drawn growing attention to application security in the last few years, putting pressure on DevOps teams to

how to performa comprehensive vulnerability assessment

How to Perform a Comprehensive Network Vulnerability Assessment

Despite growing awareness and prioritization of cybersecurity, close to 22,000 vulnerabilities were published in 2021 alone. This concerning number proves that awareness and a willingness to

iso/iec 27001 compliance and assessment

ISO/IEC 27001 Compliance Self-Assessment: The Ultimate ISO 27001 Requirements Checklist

For organizations looking to reassure customers that excellent data governance is one of their guiding principles, and that they’re doing everything in their power to mitigate

What is Log4Shell (the Log4j vulnerability)?

Log4j, Log4j, Log4j. Let’s see you say that 10 times fast. If you can’t, then you may need to learn because Log4j is on the tips

Stop leaks at the source!