Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Your guide to SaaS compliance: Key areas and best practices

Many IT managers find compliance to be one of the most complex aspects of the SaaS space. For instance, in a LogicMonitor survey on cloud solutions, 60% of the respondents highlighted governance and compliance as one of their top challenges when engaging with SaaS platforms. ‍ SaaS compliance requires adherence to various standards and regulations that can present a recurring workload for security teams in any industry.

AI-Enhanced Cyber Attacks Top the List of Potential Threats Facing Data Security

AI is quickly becoming the basis for more cyber attacks, leading organizations to realize the risk it presents. A new report now shows that AI-enhanced cyber attacks are now the top concern of security leaders. I recently wrote about how prolific ransomware attacks are and what the outcomes were for those experiencing attacks. In the same report - GetApp’s 2024 Data Security report – I also found some interesting data around where AI sits in the list of concerns for cybersecurity leaders.

Mitigating Image Integrity Violations: A Real-World Example in Runtime Environments

In the never-ending quest to speed up software release cycles, ensuring the security and integrity of application artifacts has never been more critical. As applications are continuously built, tested, and deployed, every element of the software pipeline—from source code to container images—needs to be trusted and verifiable. A key aspect of maintaining this trust is image integrity protection and validation.

The Crucial Role of Backup in Cybersecurity Awareness

As we recognize Cybersecurity Month, it is essential to focus on understanding threats and how different security measures can increase data safety. These measures include regular training, strong password practices, multi-factor autftware and devices, endpoint phentication, updating sorotection, implementing IDS and IPS, and much more. One of the measures I would like to emphasize in this article is backup and disaster recovery.

Introducing: Extensive AppSec visibility with Snyk Analytics

Your developer team is growing rapidly, and modern applications are becoming increasingly complex. With the rise of GenAI, both developer productivity and security risks are on the rise; How can your application security stay ahead? Snyk Analytics is our most powerful solution yet for AppSec leaders seeking to gain the visibility and insights needed to proactively address security threats.

Happy NIS2 Day...or is it? Navigating the shift from NIS to NIS2 and how to support long-term compliance

As digital transformation accelerates, so do the cybersecurity risks, particularly for organisations handling critical infrastructure and sensitive data. To address these challenges, the European Union has updated its cybersecurity regulations with NIS2 (Network and Information Security Directive 2), expanding and strengthening the original NIS Directive, which was established to improve cybersecurity across essential sectors.

CIO POV: Building Trust in Cyberspace

Trust lies at the heart of every relationship, transaction and encounter. Yet in cyberspace—where we work, live, learn and play—trust can become elusive. Since the dawn of the Internet nearly 50 years ago, we’ve witnessed incredible digital transformations paired with increasingly formidable threats. Knowing who and what to trust has become so difficult that the very notion of trust has been flipped on its head.

Can You Erase Your Digital Footprint?

No, you cannot erase your digital footprint, but you can reduce it by deleting inactive accounts, opting out of people search sites and adjusting your privacy settings. Your digital footprint is a collection of data left behind by your unique online activity, ranging from what you post on social media to what you browse on the internet.

1Password product enhancements [Fall edition]: Autosave, sharing, getting started, and more

Based on our commitment to making 1Password a helpful, intuitive, and easy-to-use password manager, we’ve focused on enhancing even more key features, all thanks to your feedback.

Healthcare IT Security and Compliance in 2024 and Beyond: A Comprehensive Guide

The healthcare industry remains a prime target for cyberattacks, with the growing adoption of digital health technologies escalating the risk. Hospitals and clinics, custodians of vast amounts of sensitive patient data, are particularly vulnerable. As the industry navigates the digital landscape, ensuring cybersecurity compliance is paramount to protecting patient privacy and maintaining operational integrity.