Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

What is Security Compliance Management?

Security compliance management is the process of monitoring and assessing systems, devices, and networks to ensure they comply with regulatory requirements, as well as industry and local cybersecurity standards. Staying on top of compliance isn’t always easy, especially for highly regulated industries and sectors. Regulations and standards change often, as do threats and vulnerabilities. Organizations often have to respond quickly to remain in compliance.

Introducing the new Snyk Docs Portal and Support Portal

We’re excited to announce two big updates to our Snyk User Content platform. You can now get better, quicker, clearer access to Snyk user documentation, allowing you to find the information you need, to get more and better use of your Snyk platform. This will help you implement, enable, and configure your Snyk integration, leading to a faster and smoother adoption and usage of Snyk at your company. Here are the enhancements to our User Content platform.

5 reasons why security automation won't replace skilled security professionals

The cybersecurity landscape is constantly evolving, even more so in the past decade, with technological revolutions changing the core of the cybersecurity industry. With new emerging technologies, machine learning, security automation, and AI are slowly but surely becoming a reality in the cybersecurity world. But as the cybersecurity landscape continues and redefines the roles of security workers, which logically begs the question - what does this mean for security professionals?

Confluenza and the Network Attack Surface, Part 1

It feels like there’s a new story every week about a vulnerability that affects thousands of enterprises. This is great job security for everyone working in InfoSec, as well as anyone on the “other” side! Before we get to the fun stuff, I want to reiterate how vulnerabilities like this can happen to any vendor. We are here to learn from these situations and share insights on how these types of situations can be mitigated.

CIS Control 4: Secure Configuration of Enterprise Assets and Software

Most fresh installs of operating systems or applications come with pre-configured settings that are usually insecure or not properly configured with security in mind. Use the leverage provided by multiple frameworks such as CIS Benchmarks or NIST NCP to find out if your organization needs to augment or adjust any baselines to become better aligned with policies your organization is trying to adhere to.

How organizations Handled Incidents Before and After Deploying AIOps - Part 1

Organizations are always looking for new ways to innovate and reduce costs and allocate resources more efficiently. In this blog post, we will look at how enterprises handled incidents before and after deploying AIOps.