Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

The Howler Episode 15: Debra Sevelius, VP of Legal

This month we sit down with Debra Sevelius, Vice President of Legal, as she shares the "glamorous side of commercial legal," her love of curling, and much more! As the Head of Commercial Legal at Arctic Wolf, Deb is an experienced, collaborative, globally-minded executive leader, with a proven record in leading legal and cross-functional operational teams that deliver pragmatic win-win outcomes that maximize long term value, achieve process efficiencies, and increase revenue.

Snyk vs Aikido Security | G2 Reviews Snyk Alternative

So you’re in the market for application security, perhaps even a Snyk alternative. Whether it’s your first time exploring a code security platform or you’re a seasoned user searching for better options, you’re in the right place. When developers and businesses evaluate their choices, two names often rise to the top: Aikido Security and Snyk. Both platforms offer comprehensive tools for engineering teams to secure their applications, but how do they really compare?

NIST AI RMF: Everything you need to know

The NIST AI Risk Management Framework (RMF) is one of the most advanced, globally accepted guidelines for the safe and responsible use of AI systems. If your organization implements AI in any capacity, adopting the NIST AI RMF can be a significant move toward future-proofing your operations and strengthening AI trustworthiness among customers.

What Are Spam Risk Calls and How to Avoid Them?

Spam isn’t just an annoyance to your email inbox; it's also becoming a problem for our phones. Last year, the average American received 9 monthly spam calls, totaling 3 billion spam and unwanted calls nationwide, costing $25.4 billion. Spam risk encounters people will likely receive are through: Out of people who fell for these kinds of scams, the most common amount people lost was between $100 - $249, and a smaller group said they lost over $1,000.

1Password acquires Trelica, a trailblazer in SaaS access management

From the earliest days of 1Password, our bedrock value has been building a security tool that works for our users – not against them – enabling people to behave securely without needless friction or frustration. For our business customers, this means making the productive way to work the secure way to work.

AI Compliance: Mastering Regulations with Protecto

As Artificial Intelligence (AI) adoption accelerates, so do data privacy, security, and compliance concerns. Navigating the regulatory landscape is complex, as AI applications often handle sensitive personal data across borders and industries. In this blog, we discuss the challenges of AI compliance, the regulations that impact AI, and how Protecto can help businesses master compliance with confidence.

Top 10 Cybersecurity Trends to Watch in 2025

The cybersecurity landscape is constantly evolving, and staying informed is critical to protecting your organization against emerging threats. As we step into 2025, here are the top 10 cybersecurity trends that businesses should prioritize to stay ahead of the curve. Cybercriminals are increasingly leveraging artificial intelligence (AI) to automate attacks such as phishing, malware creation, and evasion techniques.

The 7 Stages NERC CIP Audit Preparation

Maintaining compliance with the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards is a complex process that can put significant strain on security and compliance teams. Easing this strain and ensuring compliance relies on effective preparation. As the old adage goes, fail to prepare, prepare to fail. The NERC CIP preparation process is best managed using an automated solution like Fortra’s Tripwire Enterprise or Tripwire State Analyzer.

The Overlooked Risks of Open-Source Software in Industrial Security

Open-source software (OSS) has become an indispensable component in many industrial environments. Just last year, 95% of companies said they increased or maintained their use of OSS. According to the Linux Foundation, 70-80% of all code in any modern solution has been directly plucked from OSS solutions,. Cost-efficiency, flexibility, and expansive development community make OSS an attractive option for many organizations looking to innovate while managing budgets.

The secret to your Artifactory: A Deep Dive into Critical Exposures

While Artifactory tokens aren't the most common leaked secrets, GitGuardian's research reveals their critical nature in corporate environments. Recent investigations across major industries show how these tokens frequently expose sensitive resources through build configurations and DevOps code.