Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is the Gramm-Leach-Bliley Act (GLBA)?

The Gramm-Leach Bliley Act (GLBA or GLB Act), or financial modernization act, is a bi-partisan federal regulation passed in 1999 to modernize the financial industry. It repealed vast swathes of the Glass-Steagall Act of 1933 and the Bank Holding Act of 1956, allowing commercial banks to offer financial services such as investments or insurance. It also controls how financial institutions deal with their customer's private information.

What (Still) Needs to be Done to Secure the U.S. Power Grid in 2023?

It’s no secret that the U.S. power grid is one of the main foundations of the nation’s economy, infrastructure, and daily way of life. Now that almost everything is digitized, it is hinging on it even more. We wouldn’t be able to use even most vending machines (not to mention cell towers or the internet) without a working electrical supply, and the importance of keeping it safe cannot be understated. Thankfully, a lot of positive changes have already been made.

Don't Let Chargeback Fraud Ruin Your Bottom Line

It’s a typical Monday morning. You’ve just brewed a comforting cup of tea and are about to dive into the weekend sales reports for your online store. As usual, business seems to be booming until a glaring anomaly catches your eye – an alarmingly high number of transaction reversals over the weekend. A sense of unease creeps in as you probe deeper, only to uncover a chilling truth. Your business has become the latest prey to an insidious form of fraud, chargeback fraud.

Unraveling ATM Transaction Reversal Fraud: Strategies to Safeguard Your Finances

Picture a quaint, small town enveloped in the tranquility of a peaceful night. The only signs of life are flickering street lamps and the glow from the neighborhood automated teller machine (ATM). You spot someone approach the ATM, withdraw cash and walk away. It all looks so normal. What you don’t realize is that you have just witnessed a fraud attack, specifically, transaction reversal fraud (TRF).

Part 2: Preparing the Board of Directors for the SEC's Upcoming Cybersecurity Compliance Regulations

In March 2022, the U.S. Securities and Exchange Commission (SEC) issued a proposed rule, the Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure, that, if adopted, would require companies to disclose their cybersecurity governance capabilities and the role of the board concerning oversight of cyber risk.

Benefits of Using NFV with SASE

In today's digital era, businesses actively strive to heighten network agility, boost security, and slash operational costs. Network Function Virtualization (NFV) and Secure Access Service Edge (SASE) stand at the forefront of this revolution, reshaping enterprise networking and security. NFV breathes new life into traditional, hardware-based network functions, turning them into versatile, software-based solutions deployable on virtualized infrastructure.

Ransomware detections on endpoints increase by 627%

Ransomware is still present and growing across the threat landscape, to the extent that some organizations now include the cost of a ransomware attack in their annual budgets. Data from our Internet Security Report - Q4 2022 reveals that ransomware detections on endpoints rose by an alarming 627% in 2022 compared to the previous year. While ransomware does not discriminate by industry type, the report clearly shows the manufacturing sector was the most affected during 2022.

Securing CI/CD pipelines with 1Password Service Accounts

Attention developers and DevOps teams! Today we’re excited to announce that 1Password Service Accounts are now generally available to all users. Whether you’re a growing startup, a thriving mid-size company, or a sprawling enterprise, service accounts offer a secure, automated way to access infrastructure secrets exactly where they’re needed.

Mimic your mental model with Project Collections

At Snyk we’re constantly trying to improve how you can work with Projects at scale. To continue the journey, we’ve been furthering how you can organize your Projects. There are nearly limitless ways to organize projects outside of Snyk because there is no standard mental model that is used by everyone, for example, some organize projects as mono-repos, and others as application components.