Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Top Best Practices to Unlock the Power of Ultimate Programming

Do you desire the key to ultimate programming’s power? If so, you should adopt software development and programming best practices. These techniques assist developers in achieving their coding objectives, from generating clean code to avoiding coding mistakes. In this Software Developers Guide, you will discover some unforgettable tips that can change your future as a coder. You can use various best practices in addition to coding standards to unlock the potential of ultimate programming.

Password Spraying Today: Everything To Know To Prevent Password Spraying Attacks

Password spraying is a cyber threat that exploits weak passwords in order to easily compromise user accounts. That means it is critical to enforce strict access controls when authenticating users into a system. This article provides an overview of password spraying attacks, including how they work and a few real-world examples of these attacks. I’ll also look at how these attacks impact businesses, along with mechanisms to detect and prevent them.

Splunk Becomes a TISAX Participant

Co-author: Matthias Maier, Product Marketing Director at Splunk. With increasing focus on implementing security standards within the digital supply chain, national and industry-specific certifications have become increasingly important. Today, we are excited to announce that Splunk Services Germany GmbH has become a TISAX participant. The alignment with TISAX requirements demonstrates Splunk’s continued commitment to support the heightened security expectations in the automotive industry.

Navigating the Digital World: Tips for Teaching Your Kids About Internet Safety

Sorry for the bad news, but gone are the days of only worrying about your kids when they leave the house. Our little bundles of joy can now find themselves in serious trouble without ever getting their little butts up off the couch. As a modern parent, one of the most important things you can teach your child is how to stay safe online.

Cyber as a Shared Responsibility; How Rubrik and Zscaler Stepped Forward

The annual RSA Conference always brings exciting product innovations, new partnerships, and lots of debate across cybersecurity and risk practitioners, and last week’s event was no different. RSAC comes on the heels of the recently released National Cybersecurity Strategy which outlined heightened security aspirations for technology providers and organizations that maintain personal data.

Fixing half a million security vulnerabilities

Hackathons are well known among software development teams for driving innovation and collaboration. So, what if we applied that model to cybersecurity to improve an organization’s application security posture? That would be a dream come true for any CISO and security practitioner — and is exactly what we set out to do at Snyk in February 2023. Check out some of the funniest moments from our panels.

Snyk in a galaxy far away

In honor of May the 4th, we’re featuring a narrative from an Imperial trooper in a faraway galaxy as he reflects on his organization’s worst day and how it could’ve gone differently. Don’t get me wrong. I’m still proud to work for one of the most formidable organizations in the galaxy. But as most of you probably know, we’ve recently hit quite a setback. Our higher-ups decided to build a space station.

T-Mobile Customers Lose Extensive Information to Second Data Breach of 2023

T-Mobile is a telecommunications brand used throughout the United States, Poland, the Czech Republic, and Germany. The company provides text messaging services, voice communication, mobile data, and more for millions of customers. T-Mobile has been in business since 1999 and is well-known as a leading communications brand in the United States, and now we're learning the company isn't secure.