Checkmarx has introduced Checkmarx API Security, the first true “shift-left” API security solution. Building on the launch of Checkmarx Fusion, which prioritizes and correlates vulnerability data from across different AppSec engines, Checkmarx API Security is delivered as part of the industry-leading application security platform Checkmarx One. The developer workflow-oriented solution inventories even shadow and zombie APIs as part of the most comprehensive inventory and remediation solution available to secure the entire API lifecycle.
According to a recent research study from Epicor, a resounding 96 percent of organisations surveyed worldwide have confidence in their ability to navigate the early stages of the ERP purchase process, from initial evaluation to requirements planning. However, 48 percent cited a strong need for more support and partnership from their ERP providers during the latter stages of the purchase journey – from implementation, go-live, and ongoing customer care – to ease migration and realise faster time-to-value.
Matt Howard, SVP and Chief Marketing Officer at Virtru, provides some great insights into the Trusted Data Format (TDF) and explains why the time is right to launch the OpenTDF Project – giving the developer community the opportunity to address the many security complexities of the digital data ecosystem.
David Craig, Iceotope CEO, shares the company’s exciting development plans, following a recent £30 million funding round. The key investment partners bring with them a range of business and technology skills which will help Iceotope to continue to innovate in the liquid cooling market.
Kevin Brown, SVP of EcoStruxure Solutions, Secure Power, Schneider Electric, explains how DCIM 3.0 could just be the magic bullet to help organisations successfully manage their increasingly complex and hybrid IT infrastructure environments.
Eric Herzog, CMO at Infinidat, suggests that organisations will have better success with their cybersecurity strategies if they embrace the wider, comprehensive idea of cyber resilience, with data protection and storage backup and recovery having a major role to play.