Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Behind the Mask of Anonymous Sudan: An Analysis

Anonymous Sudan is a rapidly expanding and influential group of hacktivists that identify themselves as Sudanese, motivated by both religious and political beliefs. Since January 2023, they have been carrying out distributed denial-of-service (DoS) attacks, allegedly motivated by defending Islam against Western nations. These attacks have disrupted critical infrastructure and various global sectors, including finance and healthcare.

Snyk Ranked #19 on 2023 Forbes Cloud 100 List

I am excited and humbled to share that Snyk has been named to the prestigious Forbes Cloud 100 list for the fourth consecutive year, coming in at #19. The full list was unveiled this morning. This recognition follows a number of significant company milestones, including being named a leader in both the 2023 Gartner® Magic Quadrant™ for Application Security Testing and The Forrester Wave™: Software Composition Analysis, Q2 2023 report.

Allegheny County PA the Latest MoveIT Data Breach Victims on the List

Allegheny County is the second largest county in Pennsylvania, behind Philadelphia County. It is located in Southwest Pennsylvania and has approximately 1.2 million residents. This large county was the recent victim of a data breach, which means many of the county residents could be at risk of being exposed. Learn the details about this potentially disastrous data loss and who should react to the attack to protect themselves from future issues.

Security analyst FAQ: everything you need to know for a career in cybersecurity

So, you want to be a cybersecurity analyst. You’ll be pleased to know it’s a profession with a strong job outlook, thanks to the increasing importance of cybersecurity. With the rise in high-profile data breaches, privacy concerns and rapid technological advancements, there is a greater demand for cybersecurity analysts now than ever.

New DLP Tools, Location Insights, Track Network Drives, and More! (v9.0)

CurrentWare version 9.0 is here! This update introduces Advanced HTTPS transparent packet filtering technology, allowing for significant enhancements to the tracking and restriction capabilities of the CurrentWare Suite. By upgrading to CurrentWare v9.0 you will have greater protection against the data security risks of cloud storage services, potentially malicious file downloads, network share drives, and more!

THEY DID WHAT!? Auditing a security breach using Enterprise OPA decision logs and AWS Athena

You will learn how to use the Enterprise OPA Enhanced Decision Logs feature to configure Enterprise OPA (EOPA) to upload decision logs to an AWS S3 bucket so that they can be queried using AWS Athena. In mid to large sized deployments of EOPA, immense quantities of decision logs can be generated, necessitating big data tools such as Athena. This can be useful for security breach auditing, auditing access decisions, and for business intelligence in general.

How much DPO time is right?

Data protection officers (DPOs) are often seen as secret weapons in an organisations’ operations arsenal. When done right, they can quickly and effectively make the headache of managing your data protection obligations go away – leaving you free to focus on running your business. But how do you know much DPO time you need? And why? That’s what I’m looking at in this blog.

Imperium Markets uses Fireblocks to achieve Australia's first atomic eAUD settlement

Imperium Markets has completed Australia’s first atomic settlement, or the instantaneous swapping of an asset for payment, with the eAUD – issued as central bank digital currency by the Reserve Bank of Australia. Utilizing Fireblocks’ battle-tested tokenization technology, Imperium Markets’ pilot saw two major banks – Westpac and Commonwealth Bank – successfully issue and invest in certificates of deposit.