Systems | Development | Analytics | API | Testing

Security

SOC2 Certification

Speedscale Inc. has achieved SOC 2 Type I compliance in accordance with American Institute of Certified Public Accountants (AICPA) standards for SOC for Service Organizations also known as SSAE 18. Achieving this standard with an unqualified opinion serves as third-party industry validation that Speedscale Inc. provides enterprise-level security for customer’s data secured in the Speedscale Inc. System. Speedscale Inc.

How to defend against Ransomware, the threat that holds your data and business hostage

With contributions by Anwar Haq and George Alifragis Ransomware has grown to become a significant threat to organizations today, no matter the size or industry. Cybercriminals are exploiting vulnerabilities in small businesses and enterprises alike, creating short-term and long-term damage that can impact everything from your employees’ productivity to your relationship with customers.

Top DevSecOps Tools For 2022

DevSecOps combines the responsibilities of development, security and operations in order to make everyone accountable for security in line with the ongoing activities conducted by development and operations teams. DevSecOps tools serve to assist the user in minimising risk as part of the development process and also support security teams by allowing them to observe the security implications of code in production.

Tales of Engineering Leadership: Lessons Learned Growing a Team of 1 to 150 at Snyk

What does it take to be a successful engineering manager? What does it take to scale and grow your team and your people - and what should you avoid doing at all costs? In this webinar, Liran Haimovitch, Rookout’s CTO, will host Anton Drukh, formerly VP Engineering of Snyk and GM Israel and now an engineering leadership consultant, to discuss how Anton scaled engineering at Snyk from 1 to 150 (!) and what he learned along the way, including what decisions supported their rapid growth and what mistakes were made that you can now avoid.

Best practices for securing your applications and APIs using Apigee

Enterprises across the globe are seeing surging demand for digital experiences from their customers, employees, and partners. For many of these enterprises, hundreds of business applications are hosted in private or public clouds that interact with their users (customers, partners, and employees) spread across geographies, channels (web, mobile, APIs, VPNs, and cloud services), and time zones.

Interview with CISCO, Victor Kritakis

For the next interview in our series speaking to technology and IT leaders around the world, we’ve welcomed experienced CISCO Victor Kritakis, of Epignosis. As the head of the company’s information security policy, he is responsible for penetration testing and vulnerability assessments, staff cybersecurity training, administration of the bug bounty program, as well as maintaining the ISO 27001 certification standards.

Electric Vehicle Overview: Electric Vehicle Software

Currently, electric vehicles make up less than 1% of cars currently on the road, according to global business-focused news organization, Quartz. However, within the next decade that will rapidly change. By 2040, it is estimated that electric vehicles will make up roughly 33% of all cars on the road, according to a Bloomberg New Energy Finance study.