Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Biden on cyber security after 100 days: A good start, but now comes the hard part

Cyber security experts weigh in on what we’ve learned about President Biden’s cyber security strategy in his first 100 days in office. President Joe Biden declared in mid-December, more than a month before he took office, that cyber security would be a “top priority” of his administration. It should be. The digital world, as we are all now reminded daily, has a direct impact on the real world, for better and worse.

6 Steps To Improve Your Data Security and Data Compliance

Data privacy has been a hot topic in the tech world for years now. With every new technology come new regulations that require companies to completely re-examine the way they handle private data. Most companies already have a basic data privacy policy they constructed alongside lawyers and tech experts to avoid facing serious fines and penalties. However, compliance isn’t just about focusing on current regulations and meeting the bare minimum requirement to avoid legal consequences.

3 Best Practices for Customizing Your Compliance Program

Most large-scale entities need to prove compliance with multiple regulatory standards. In their efforts to meet their compliance mandates, organizations could suffer a major drain on their time and resources. This possibility holds true regardless of whether they’re finance companies, retailers, manufacturers or hospitality firms. Organizations face an additional obstacle when they have an internally created compliance standard that demands enforcement.

Go Beyond Core AIOps Use Cases with Robotic Data Automation (RDA) and AIOps Studio

Implementing any IT project requires time, planning, and effort and AIOps probably requires even more planning and stakeholder involvement, because of the breadth of coverage and potential to bring profits to multiple IT domains/functions (ex: ITOps/ITSM/NOCOps). Customers have high expectations from AIOps, but, even after taking such major projects, most AIOps vendors are only able to support a few core AIOps use cases, which severely limits the utility and potential of AIOps.

Snyk & Intuit roundtable: Breaking silos, engaging with security and developer communities

I recently attended a Snyk roundtable with Intuit, and it was such a good session that I wanted to write a post sharing some of the insightful discussion and takeaways — starting with this great artistic impression of the session! As a TL;DR, here are my biggest takeaways from the session.

What You Missed at Aiming for Zero

In case you missed it, Netskope’s recent Aiming for Zero event was focused around how Zero Trust is more than just access controls and passwords—it’s a security concept that applies to all aspects of your network, your data, the applications you use, and the way you interact with them. If you missed the event and want to hear more about our deep dives int Zero Trust, there’s no need to worry!

What is Threat Modelling? 10 Threat Identity Methods Explained

Threat modelling is a process for identifying potential threats to an organization's network security and all the vulnerabilities that could be exploited by those threats. Most security protocols are reactive - threats are isolated and patched after they've been injected into a system. Threat modelling, on the other hand, is a proactive approach to cybersecurity, whereby potential threats are identified and anticipated.