Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Despite Lowest Software Flaw Frequency, Manufacturing's Fix Times Lag and Create Ransomware Risk

In 2021, manufacturing became cybercriminals’ most targeted industry as a surge in global ransomware attacks disrupted manufacturing operations and exacerbated supply chain woes. This put even more pressure on manufacturing organizations that were already feeling the heat. Recognizing that ransomware attacks can stem back to software vulnerabilities, many manufacturers are exploring ways to strengthen their software security programs.

AppSec Decoded: DevSecOps in a post-pandemic world | Synopsys

In this episode of AppSec Decoded, recorded live at RSA 2022 in San Francisco, cybersecurity experts Natasha Gupta, security solutions manager at Synopsys, and Taylor Armerding, security advocate at Synopsys, discuss pandemic-accelerated improvements in DevSecOps.

Stranger Danger: Your Java Attack Surface Just Got Bigger

Building Java applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome, you're a cloud native application developer! As developers, our responsibility broadened, and more software means more software security concerns for us to address.

User Office Hours | How to Secure CI/CD Pipeline w/ GitHub Actions & Snyk | Mar 23, 2022

This User Office Hours session covers how to build a secure CI/CD Pipeline with GitHub Actions and Snyk. First, we'll build a demo application. Then, we'll walk through how to test for security issues using Snyk Open Source and Snyk Code. We'll then go on to deploy a container image. Missed the live stream? Feel free to ask questions in the comment section, and we'll do our very best to answer them.

Solving Cross-Border Payment Challenges: New Players, New Risks, and New Technology

Over the last few years, rapid digital payment adoption and technology development have played an essential role in making international money transfers cheaper, faster, and easier than they were decades ago. The volume of cross-border transactions is now expected to grow to $39.9 trillion by 2026, as these payments are essential in the interconnected economy.

State of Zero Trust adoption in Australia

Zero Trust, a phrase coined by Forrester in 2009, is not a commonly used cybersecurity strategy in Australia and the Asia-Pacific region. In the United States, large technology companies and the federal government have been eager to adopt Zero Trust. But in Australia and New Zealand, Zero Trust adoption has been prolonged. People were confused about what Zero Trust means.

What Drives Cyber Risk? Cyber Insurers and SecurityScorecard Reveal Answers

Seeking to stay ahead of hackers, many researchers have asked themselves what drives cyber risk. And many cyber insurance carriers have wondered how to accurately underwrite and price the risk. According to preliminary results from SecurityScorecard’s joint work with our cyber insurance partners, the answer is clear but multi-faceted.

Cybersecurity Awareness Month: Answering 3 Big Questions About Secure Passwords

Passwords have been employed by many since the days of the Roman Empire, and they quickly became omnipresent as we approached the digital age. However, rapid changes in the security landscape have forced us to evolve what our passwords look like and how they are used. At times, this has led to conflicting advice and confusion on what proper password management looks like. By clarifying how to best create and use passwords, we can make it easier for people to stay safe online.

Sneak Peek: Elastic's 2022 Global Threat Report

The Elastic Security Labs team is passionate about securing the world’s data from attack, and strives to raise the bar within the security industry. To this end, Elastic Security Labs has compiled the 2022 Global Threat Report to share trends and tactics adversaries and attack groups use, as observed by our threat research team and broader user community over the past year. Let’s dig into a few of the endpoint related findings.

SREs bring ORDER(R) to CHAOS

Categorizing the challenges and duties of your trusted friend, the site reliability engineer (SRE). From Snyk Ambassador Keith McDuffee, DevSecOps and founder of StackRef.com. “What’s the difference between a DevOps engineer and a site reliability engineer?” It’s a question I hear all the time — and one I’ve heard (and sometimes asked) in job interviews. But is there a correct answer? It all depends on who you ask.