Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What do telecom security teams need from a SIEM?

More than “just SIEM” Just within the last 30 days, the two largest telecom operators in Australia1 were hit by a data breach impacting millions of customers and compromising sensitive personal information like home addresses, drivers’ licenses, and passport numbers. The situation is not very different in the Americas, where another leading telecom provider2 cited a 13% jump in ransomware attacks in the past year.

What is an Individual Validation (IV) Code Signing Certificate?

In this article, you will learn What is Individual Validation Code Signing certificate, how its need and how software developers use them. As of now, most people think that only large organizations develop software. But, it could be more accurate, as there are individual developers who build and launch avant-garde applications. And they also utilize digital certificates, known as IV Code Signing Certificates, for boosting security.

New Canadian Cyberattack Data Says 80% of SMBs Are Vulnerable

If you were to take a look at the cybersecurity news cycle, you’d be forgiven for thinking that it’s only large enterprises with expansive customer bases and budgets that are the most vulnerable to attacks. But that’s not entirely true. Even if it’s at a much smaller scale, small- and medium-sized businesses (SMBs) still have stores of sensitive information that’s appealing to bad actors — and they’re often much less equipped to protect that data.

Cybersecurity Awareness Month: CU in Cyber

If you're in the cybersecurity sector, you'll know that October is “Cybersecurity Awareness Month,” a time when cybersecurity specialists everywhere push hard to get the message out that cybersecurity is important. Each year, there is a different theme, and for 2022, the theme is "See Yourself in Cyber." According to the CISA website, the theme is meant to demonstrate that "while cybersecurity may seem like a complex subject, ultimately, it's really all about people.

4 Active Directory Attacks and How to Protect Against Them

I was speaking with an Active Directory security engineer at a global pharmaceutical company recently, and I asked him the most classic question in the product management handbook: “What keeps you up at night?” So cliché (I know), but sometimes instead of an eye roll, you get a real gem, which is exactly what happened.

Snyk's new native integration with Bitbucket Cloud emphasizes dev-first security

Snyk is excited to announce a new, native integration with Atlassian Bitbucket Cloud. This new release improves Snyk’s functionality within Bitbucket Cloud, making installation faster, and easier to implement. Our Bitbucket integration is the first out-of-the-box embedded security experience within the Atlassian UI, enabling users to access high vulnerability counts and rich contextual information right from their native Bitbucket workflow.