"We Mean Secure E-Business since 1998"

Safeguarding Your Code: Protecting Against Supply Chain Exploits

The Hidden Threat to Your Software: How to Keep Your Code Safe from Supply Chain Exploits

Safeguarding Your Code: Protecting Against Supply Chain Exploits

Beware of Lurking Threats in New Software: Did you know that according to a study by Gartner reported in Cybersecurity Drive, new software contains a big chunk, around 40% to 80%, of code from third-party sources? These include various components like libraries and software development kits. So, not only do you have to worry about […]

Read more

New Google Chrome 'tune' icon (Adweb Technologies)

Google Chrome’s Lock Icon to Be Replaced with New Tune Icon: What It Means for Users

As the internet continues to evolve, so does the way we think about security online. One of the most iconic symbols of online security, the lock icon that appears next to the website URL in your address bar, is about to get a makeover. In a recent blog post, Google announced that it will be […]

Read more

    © 2019 - All rights reserved.