Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

CyRC special report: Secure apps? Don't bet on it

The Cybersecurity Research Center conducted a security analysis of the 10 most popular Android sports and betting apps. With the Super Bowl approaching in the U.S., the Synopsys Cybersecurity Research Center (CyRC) set out to evaluate the 10 most popular Android sports and betting apps through the lens of supply chain security. We used Black Duck® Binary Analysis (BDBA) to examine the open source components used in these apps.

iOS vs. Android Phone Security: Which Mobile OS Is More Secure in 2023

In today's digital age, smartphones have become integral to our lives. They are our companions day in and day out, holding our personal information, photographs, and financial details. Statista reports that the Google Play Store currently boasts an impressive number of over 2.9 million apps. The figures indicate the growing popularity and success of android application development companies in the market.

Unpacking the GDPR: An In-Depth Look at the EU's Landmark Legislation

The General Data Protection Regulation (GDPR) is a landmark piece of legislation in the European Union (EU) that sets out rules for how how businesses process and protect personal data of EU citizens. It applies to any business that collects personal data from EU citizens, regardless of whether the business is located in the EU or not. This makes it a truly global regulation and it has been driving significant change in the way businesses manage and protect personal data.

The 3 Major Shortcomings of Traditional DLP

As digital transformation continues to blossom and cloud adoption increases, we continue to see challenges crop up when it comes to traditional DLP solutions. Setting aside the architectural and operational complexity and high cost that comes with traditional DLP, practitioners recognize that existing tools aren’t able to keep up.

How to Enforce an Access Control Policy

Access control is the process of dictating who or what can access resources and assets and what actions are allowed once access is granted. An access control policy, by way of an enforcement mechanism, puts those parameters into action. Safeguarding data, IT systems and applications requires a robust access control solution, especially where financial, medical and other sensitive data is concerned.

The Dark Side of AI: How Malicious Bots May Exploit ChatGPT

In recent years, the world of artificial intelligence (AI) has seen a significant increase in the use of language models. ChatGPT, a language generation model developed by OpenAI, has been making waves in the news with its ability to process large amounts of data, which can be used to train machine learning models and to test them. One feature that’s grabbed headlines is its ability to write code and provide feedback on the accuracy and efficiency of code.

Automate Cloud compliance with Snyk Cloud

Audits are challenging. Especially when it comes to assessing abstract compliance standards against multiple cloud environments, unique cloud infrastructure setups, and many possible (mis)configurations. To help our customers automate compliance assessments, Snyk Cloud now supports 10+ compliance standards— including CIS Benchmarks for AWS, Azure, and Google Cloud, SOC 2, PCI DSS, ISO 27001, HIPAA, and more.

Fostering the Next Generation of Cyber Security Professionals: A Grassroots Approach

Discover the potential of incorporating mandatory cyber security lessons in schools and the impact it could have on developing future experts in the field. Learn how countries like Israel are leading the way and why it's time for the UK to invest more in STEM education, including cyber security. Change the perception of the industry and inspire the next generation to become problem-solvers and solutions providers in the field.

Log Management Key to Meeting OMB-21-31 Requirements

Last Summer, President Biden issued Executive Order 14028 to help boost and improve government cybersecurity operations in response to increased threats worldwide. Memorandum OMB-21-31 from the Office of Management and Budget soon followed, which explained the critical role data log collection and analysis play across all branches of the Federal Government.