Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

Russian-linked malware cyberattacks: what you need to know about Hermetic Wiper and Cyclops Blink

Just days after Russia launched its invasion against the people of Ukraine, news reports emerged of several cyberattacks. Deployed systematically ahead of the land invasion, Russian cyberattacks against Ukraine have rendered Ukrainian banks, government departments and other core services unavailable through the use of sophisticated ‘data wipers

Security Service Edge (SSE) Is the Way To Go, but How Do You Choose?

Gartner® recently predicted that “By 2025, 80% of enterprises will have adopted a strategy to unify web, cloud services and private application access from a single vendor’s security service edge (SSE) platform."* If you don't know what SSE is, you should read my colleague Sundaram Lakshaman’s breakdown of SSE and Secure Access Service Edge (SASE). The gist of it is that SSE is the convergence of security technologies inside the SASE framework.

Fast Company Recognizes Arctic Wolf as "Most Innovative Company" Alongside Iconic Industry Pioneers

We are excited to share that Arctic Wolf® is ranked 42nd on Fast Company’s Top 50 Most Innovative Companies List, and number 2 in the award’s Security category. This prestigious list recognizes businesses that are making the biggest impact within their industries and on culture as a whole—companies thriving in today’s dynamics. At Arctic Wolf, we constantly innovate because cyber threats are continually impacting our world, whether as organizations or as individuals.

How to use 1Password Families with both friends and relatives

Over the years, we’ve heard of many creative ways friends and families use shared vaults to manage their private information. While “Families” is in the name, 1Password supports every kind of family – whether you live together or separately, and whether you’re blood relatives, friends, or roommates. We want to make sharing personal data easy and secure for you and those you care about.

Random but Memorable - Episode 9.0: Puzzle Solving Developer Community with Stack Overflow

This week, we’re joined by Jeremiah Peschka from Stack Overflow to learn why building communities for developers is so important, and how code is reshaping our world in 2022. In Watchtower Weekly this episode, we also discuss how hacking communities have responded to the conflict in Ukraine and how graphics-chip giant, Nvidia, may have got revenge on its hackers. Plus, if Wordle wasn’t addictive enough, we also take a look at the lesser-known version: PassWORDLE!

Mitigating Risks in Software Supply Chain

By 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains (Gartner) which are only becoming increasingly complex due to the changes in how modern software is built. These trends, together with new federal regulations, require organizations to take action to ensure the security and integrity of their software. But this is easier said than done.

How the Ukraine-Russia Conflict Could Impact Cybersecurity

The Ukraine-Russia conflict has captured the world’s attention, but the physical warfare only tells part of the story. In the weeks leading up to the invasion, seemingly state-sponsored cyberattacks against Ukraine have risen, and now experts fear this may spill over to other nations, too. While much about the conflict remains uncertain, it will undoubtedly have a profound impact on cybersecurity across the globe.

Simplifying container security with Snyk's security expertise

The most beautiful and inspiring aspect about open source code is, well, that it’s open source. We can look at open source packages like gifts that are exchanged between developers across the engineering world, allowing them to learn from the work other people do, contribute their own expertise, and grow their professional capabilities. Contributing to open source is much appreciated, and it is important to remember not only to benefit from these projects, but also to contribute back.

How to Hack Kubernetes (and How to Protect It)

Kubernetes is a valuable resource and a leading container management system in development pipelines across the world, but it’s not exempt from malicious attacks. Using Kubernetes requires a deep understanding of Kubernetes’ environment—including the different vulnerabilities you can be exposed to while creating, deploying, or running applications in your clusters.