SoftwarePlaza IT Magazine

Connecting people and technology through news, insights, and inspiration.
Filter & Sort
  1. Article
    Master API security: Securing your entire API ecosystem with Beagle Security’s API discovery

    Discover how unchecked API sprawl creates critical security blind spots for fast-growing fintech startups, leading to data breaches and operational inefficiencies. Learn how Beagle Security's API discovery feature automatically uncovers and tests all APIs within Kubernetes or Istio environments, ensuring complete visibility and proactive vulnerability management.

  2. Video
    Mastering Modern Threats: Checkpoint's Roy Barda on WAF, API, and Contextual AI 

    Explore Checkpoint’s AI-driven CloudGuard WAF with Roy Barda—proactive zero-day protection, API security, anomaly detection, and a live demo showcasing advanced threat prevention and usability.

  3. Article
    Meet the application security platform built for the AI era

    The era of vibe coding is here. Learn how Endor Labs is helping AppSec teams secure and fix AI-generated code with a new agentic AI platform.

  4. Article
    Memorial Care Securely Elevates Communication Standards and Boost Efficiency with Grammarly

    MemorialCare needed a solution to improve internal communication without compromising patient data. Discover how they leveraged Grammarly's HIPAA-compliant enterprise product to centralize communication, save over 20 days per employee annually on revisions, and boost confidence across their growing healthcare workforce.

  5. Article
    MemorialCare améliore en toute sécurité ses normes de communication et son efficacité grâce à Grammarly

    MemorialCare avait besoin d’une solution pour améliorer la communication interne sans compromettre les données des patients. Découvrez comment ils ont tiré parti du produit d’entreprise de Grammarly conforme à la HIPAA pour centraliser la communication, économiser plus de 20 jours par employé et par an sur les révisions, et renforcer la confiance au sein de leur personnel de santé en pleine croissance.

  6. Article
    Mirantis Announces Lens Control Centre for Centralized Management of Lens Pro Deployments

    Lens Control Central allows enterprises to centralize and manage their security needs for large deployments.

  7. Video
    Mitigant's cloud attack emulation: Real security testing without breaking production

    Mitigant's Nils Karn and Thomas Fricke explore cloud attack emulation—real attacks in safe environments—to test resilience and improve security with high accuracy.

  8. Article
    Mitsubishi UFJ e-Smart Securities Optimizes Package Management and Automates Deployment with JFrog

    Mitsubishi UFJ e-Smart Securities has historically faced challenges around optimizing deployment and package management. By adopting the JFrog Software Supply Chain Platform, the company has transformed its approach to DevOps and realized significant improvements in security, efficiency, and speed.

  9. Article
    Modern API Security: Infinidat’s Approach to Detecting Risks in Cloud-Native Apps

    Modern API security explained: why APIs are prime targets, common OWASP risks, runtime protection, AI anomaly detection, and secure-by-default cloud-native design.

  10. Whitepaper
    Moving to Git: Implement Git to improve collaboration and ship faster

    Download the whitepaper now to take the first step towards a more collaborative, efficient software development lifecycle.

  11. Article
    Mysten Labs Improves DevEx with Endor Labs

    Discover how Mysten Labs, pioneers of the Sui blockchain, transformed their AppSec by ditching an unreliable tool for Endor Labs. Learn how they achieved trusted findings, minimal developer friction, and faster remediation, enabling them to build the world's most secure blockchain.

  12. Article
    National Energy Operator’s Journey to DevSecOps Excellence with JFrog

    This energy operator and facilitator oversees key national electricity and gas markets. By adopting the JFrog Platform, they transformed their software development operations and security practices, achieving significant operational efficiencies, enhanced security, and millions in cost savings.

Items 277 to 288 of 410 total

Show per page