Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Everything You Need to Know About Open Banking Security

Financial services have developed at a breakneck pace, resulting in fierce competition among financial technologies. These services in the digital age must be characterized by three words: rapid, efficient, and intuitive. It is no longer necessary to wait in queues to speak with a bank teller. Consumers today want to manage their accounts using their smartphones, and banks want to earn their loyalty. What is the common ground? Using modern technologies to find new methods of doing things.

Introducing Snyk developer-first security into the Terraform Cloud workflow

With the rise in popularity of technologies such as HashiCorp Terraform, Docker, and Kubernetes, developers are writing and maintaining more and more configurations in addition to building the application itself. The growing use of infrastructure as code presents security complexity and the potential for risk that developers often struggle with as their workloads increase and more advanced skills are required.

The Top Cyber Attacks of September 2021

September confirmed some things we already knew about the current state of cybercrime: While undersecured corporate targets remain tempting targets for hackers, the situation is increasingly worse for data-rich organizations such as governments, schools, and healthcare facilities. All of those sectors had cause for concern as the month drew to a close.

Automating Cloud Security Posture Management Remediation

When we discuss cybersecurity and the threat of cyber attacks, many may conjure up the image of skillful hackers launching their attacks by way of undiscovered vulnerabilities or using cutting-edge technology. While this may be the case for some attacks, more often than not, vulnerabilities are revealed as a result of careless configuration and inattention to detail. Doors are left open and provide opportunities for attacks.

CIS Control 07: Continuous Vulnerability Management

When it comes to cybersecurity, vulnerability management is one of the older technologies that still play a critical role in securing our assets. It is often overlooked, disregarded, or considered only for checkbox compliance needs, but a proper vulnerability management program can play a critical role in avoiding a series data breach. CIS Control 07 provides the minimum requirements, table stakes if you will, for establishing a successful vulnerability management program.

Supply chain attacks: Who's your weakest link?

Supply chains are at the front of everyone’s minds right now. From fuel and food to toys at Christmas – the general public are starting to understand just how finely balanced the global supply chain truly is. Events like microchip shortages in Taiwan and the Ever Given blocking the Suez canal show how interconnected modern economies are, and how dependent our huge populations are on effective supply chains.

5 Reasons Every AEC Firm Should Care about CMMC

Since the Cybersecurity Maturity Model Certification (CMMC) was released in January 2020, there has been a lot of hand-wringing over what it means and who should actually care. This is especially true for AEC firms, many of which figure this regulation only applies to big system integrators and defense contractors like Northrup Grumman and Boeing. But CMMC isn’t just about large enterprises. Any organization that currently contracts with, or plans to contract with the U.S.

5 Trends in Ecommerce Fraud: How to Protect Your Business in 2021 and Beyond

These days, when I cautiously venture to my favourite shopping mall on a weekend, I notice how different it is from a year-and-a-half ago, when no one had ever heard of COVID-19. It is busy, but not nearly as busy as it was back then. Sadly, I can rarely find my shoe size as merchandise stocks are low due to COVID-related supply chain issues.