Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Operational Resilience Deadlines Are Coming Soon

With increasing cyber threats, data breaches, and the rapid pace of digital transformation, operational resilience has become a top priority for financial institutions. As we begin 2025, this is especially true in the UK, because of new regulations going into effect. Regulatory bodies like the Financial Conduct Authority (FCA), Prudential Regulation Authority (PRA), and the Bank of England have introduced stringent rules to safeguard the stability and resilience of the financial services sector.

Securing the Digital Future: AppSec Best Practices in Digital Banking

On November 12th, 2024, at the Pavilion Hotel in Kuala Lumpur, Snyk’s Field CTO, Pas Apicella, delivered an insightful presentation at the Digital Banking Asia Summit 2024 in Malaysia. Titled, ‘Securing the Digital Future: Best Practices for Application Security in Digital Banking’, his talk focused on actionable strategies to address pressing challenges in the financial services industry.

The LastPass Data Breach (Event Timeline And Key Lessons)

In August 2022, LastPass suffered a data breach with escalating impact, ultimately resulting in a mass user exodus toward alternative password manager solutions. This post provides an overview of the timeline of events during the LastPass cyber attack and critical lessons to help you avoid suffering a similar fate. Learn how UpGuard streamlines Vendor Risk Management >

What Is Behavioral Cloud Application Detection and Response (CADR) and Why It's Essential for Cloud-Native Security?

In this blog post, we will introduce the concept of behavioral Cloud Application Detection & Response (CADR). In case this is the first time you have heard of CADR, we’ll start by explaining that concept and explain why it’s essential for protecting modern applications. Let’s go.

Unveiling The Surge: Rising Car Insurance Costs In 2025

Do rising car insurance costs have your wallet feeling the pinch? Between 2020 and 2024, rates shot up by a staggering 54%, leaving many drivers struggling. This blog will break down why premiums keep climbing and what factors influence them. Don't miss out on tips to better understand these changes!

Top 5 Mistakes SAQ A-EP Merchants Are Making in 2025 That Will Knock Them Out of PCI 4.0 Compliance

If you thought PCI DSS 4.0.1 was just a minor tweak to the old requirements, think again. 2025 is here, and it’s clear that many SAQ A-EP merchants are still missing critical steps needed to stay compliant. In fact, we noticed that over 90% of SAQ A-EP merchants aren’t aware that they need to implement new technical measures to address Requirements 6.4.3 and 11.6.1.

MSSP vs MSP: Different Levels of IT Services

It only takes seconds for a normal workday to turn disastrous. No matter what industry you’re in, handling your IT obligations is crucial. A single data breach costs an average of $4.5 million to overcome. Many people choose to outsource these responsibilities, but not everyone knows how to find the right provider. This is especially true when looking for an MSSP vs MSP. Knowing the difference can help you make the best decision for your IT operations and overall business security.

5 DevSecOps Checklists to Embrace Advanced Techniques in 2025

If you’re here, you know the basic DevSecOps practices like incorporating proper encryption techniques and embracing the principle of least privilege for access control. You may be entering the realm of advanced DevSecOps maturity, where you function as a highly efficient, collaborative team, with developers embracing secure coding and automated security testing best practices.

Why Configurations Are the Wrong Thing to Get Wrong

So many times, we look beyond the mark. With our feeds constantly inundated with headline-grabbing news about AI-generated threats, nation states upping their cybercrime game, and sophisticated new forms of malware, we can be tempted to think that the bulk of cyberwarfare is going on "up there" somewhere. In reality, most breaches still originate from unforced errors, and threat actors are just like anybody else – they don't like working harder than they need to.

ISO 27001 Audits: What You Can Expect from Your Auditor

The final step to achieving ISO 27001 certification is passing a final audit of your ISMS. During this process, you will work with an external, third-party auditor to perform a thorough audit of your systems, to evaluate compliance with the guidelines in ISO 27001. The question is, what will that auditor be doing? Do you hand them paperwork and the keys to the building and let them do their thing, or are they more interactive? What can you expect when working with your auditor?