Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Python now fully supported in Snyk Code

Earlier this year, we announced the beta support for Python in Snyk Code. This beta period gave us the chance to let customers have access to our extensive collection of Python rules while we finished our knowledge base review and added curated content. We are happy to announce that this work has concluded, and Python is now a fully supported language. 🐍 🎉

When trust goes wrong - supply chain attack, examples and prevention measures.

Industries of all kinds make use of supply chain management software to automate their business processes. A supply-chain attack is an incident in which one or more people with malicious intent insert themselves into the flow of production, distribution, and/or system management. Supply Chain Attacks usually target manufacturers that create software or services for other companies who use those products while serving their end customers.

A Real-World Look at AWS Best Practices: Password Policies

Best practices for securing an AWS environment have been well-documented and generally accepted, such as AWS’s guidance. However, organizations may still find it challenging on how to begin applying this guidance to their specific environments. In this blog series, we’ll analyze anonymized data from Netskope customers that include security settings of 650,000 entities from 1,143 AWS accounts across several hundred organizations.

The Right Steps to SASE: Place Core Inspection Points Between Users and Apps

This is the third in a series of seven posts detailing a set of incremental steps for implementing a well-functioning SASE architecture. With a Next Generation Secure Web Gateway (NG-SWG) firmly in place and your visibility into all your traffic dramatically increased, one thing is certain: You may not like what you see next. Are your people using Microsoft Office 365? Salesforce? Workday? Box? The answer is almost certainly, yes.

What Is Security Information and Event Management (SIEM)?

A cyberattack is expected to occur every 11 seconds in 2021 — nearly double the frequency just a year earlier. These incidents often involve breaches of sensitive proprietary information and cost the organizations involved millions of dollars. Despite all the resources being devoted to improving cybersecurity, new threats continue to arise faster than defense capabilities.

Egnyte Expands Content Governance and Compliance Solutions for Google Workspace and Dropbox

If you’re like most companies, your teams rely on a variety of cloud apps and storage solutions to get work done and collaborate with internal and external teams. While this flexibility is great for end users, it creates enormous complexity when it comes to data security and governance. IT teams must juggle multiple administrative dashboards, permissions configurations and access control policies across apps.

Are crypto miners feeding the GPU scalper bot frenzy?

Table of Contents PC gamers have long been frustrated by the rising cost of top-performing graphics cards, fueled in part by GPU-hungry cryptocurrency miners. It’s a dream scenario for scalpers, but can it be stopped? As experts in malicious bot activity, we talk a lot about scalpers at Netacea. Our Head of Threat Research Matthew Gracey-McMinn has even appeared on US news channels to talk on the subject.