Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Key Cybersecurity Trends in 2023

Here are 3 key insights for 2023 I’ve gained after talking to dozens of CISOs and CIOs: Their budgets are not decreasing. Even though we see volatile and turbulent market conditions ahead, most CISOs’ budgets are not decreasing. It’s good news that the industry continues to thrive despite the economic headwinds. They are focusing on public and private sector collaborations. Many governments are amping up their security investments in light of the Ukraine conflict.

Cyber Insurance: Is It Fit For Purpose? | Razorwire Podcast

Most businesses will have a plethora of insurances - employer liability, public liability and indemnity, for example - but what about cyber insurance? It is a relatively new area of insurance, although the risk has existed almost since we started using computers and mobile devices. According to the UK Government Cyber Security Breaches report, 39% of UK businesses have identified at least one cyber attack in the past 12 months, making cyber insurance more crucial than ever.

How to Modernize Access Control for Cloud Applications with Or Weis

Building Modern Access Control for Cloud Applications Join us in this livestream with Permit.io CEO Or Weis as we cover what it means to build modern access controls for cloud applications. Many companies these days find themselves having to reimplement access-controls over and over; therefore, in this episode we discuss solutions, the 5 best practices and open-source tools that can be used. Didn't catch the live stream? Ask all of your Snyk questions and we’ll do our very best to answer them in the comment section.

Introduction to Snyk's revamped reporting

A short overview of Snyk's new and revamped reporting capabilities, providing the visibility needed to hold data-based conversations between development and security. Key new capabilities include the addition of Snyk Code data, improved user experience and performance, new filtering and data sorting, and new sharing options. Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.

New Microsoft Research Emphasizes Critical Importance of Password Management

It’s no surprise that cyberattacks are skyrocketing. Report after report indicates they’ve exploded in recent years as cybercriminals take advantage of the rapid proliferation of endpoints, growing reliance on digital devices, and shift toward remote and hybrid work. However, as the number of attacks increases, the types of attacks remain surprisingly simple. You guessed it. They’re still going after passwords, credentials and secrets.

How to Keep Kids Safe Online

We live in the 21st century, where now kids are able to access the internet on their own from as early as 8 years old. Today’s youth are often called “digital natives” because they are so comfortable with living online. But as much as we may admire their proficiency with their devices, we shouldn’t forget that security is probably not top of mind.

CVE-2022-27510: Citrix Gateway and Citrix ADC Critical Authentication Bypass Vulnerability, along with CVE-2022-27513 & CVE-2022-27516

On November 8th, 2022, Citrix disclosed a critical authentication bypass (CVE-2022-27510), a remote desktop takeover (CVE-2022-27513), and a user login brute force protection functionality bypass (CVE-2022-27516) vulnerability affecting several versions of Citrix ADC and Citrix Gateway. This bulletin only applies to customer-managed Citrix ADC and Citrix Gateway appliances as Citrix-managed cloud services are not affected. A threat actor could leverage these vulnerabilities in specific circumstances.

WEF Report Details Best Practices for Zero Trust Deployment

Cybersecurity, like broader technological disciplines, is an ever-changing landscape that industry professionals must adapt to. The zero-trust model of cybersecurity has grown recently as organizations update their security practices to keep pace with, and stay ahead of evolving threats. Zero Trust Network Access (ZTNA) increased by 230% from 2019 to 2020, and more than 80% of C-suite leaders cite zero-trust as a priority for their enterprises.