Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

The Interview Series - Corey Williams, CyberArk

Grab a coffee and join us for a chat with CyberArk’s Head of Identity Security Marketing, Corey Williams. If you don’t know them already, CyberArk are leaders in identity security and access management. We talk about how the pandemic has changed the way businesses can (and should!) adopt technology to improve business processes and the challenges that come with this, including how to tackle a lack of understanding and improving communication within your organisation.

The new normal is actually very normal: Punctuated equilibrium, security cycle theory, and the "New Normal"

In 2020, the world was hit with an unexpected pandemic that changed much of life as many had come to know it. Virtually overnight, masks were required, employees were working remotely, children were home from school, and businesses were locked down to stop the spread of Covid19. In reading the news and social media the term “The New Normal” has taken front and center as the image that is being promoted.

Three New Supply Chain Attack Methods You Should Be Aware Of

Another day, another supply chain attack. No sooner did we recover from the SolarWinds breach, than we found ourselves reeling from a new ClickStudio attack. That’s why we’ve decided to launch this new series, fondly named The Source, to provide you with the latest news and updates on supply chain security. On this installment of ‘The Source’, get to know the red hot supply chain attack methods du jour.

How AppSec has evolved in 2021: Reddit's perspective

As organizations continue to rely on software for core business processes, application security is an ever-critical consideration. Snyk recently held a roundtable with Reddit to discuss application security in 2021. In this post, we’ll recap the discussion between Guy Podjarny, President & Co-Founder of Snyk, and Spencer Koch, Security Wizard at Reddit.

15 signs your vendor has been breached in 2021

The Solarwinds supply chain attack has made the danger of third-party breaches very clear. Businesses globally are realizing that their vendors may not be as secure as they originally thought. The concerning truth about vendor relationships is that you can never be confident of a prospective vendor's cybersecurity. In fact, onboarding new third-party vendors increase your digital risk and the likelihood of becoming victim to a third-party breach.

Biden on cyber security after 100 days: A good start, but now comes the hard part

Cyber security experts weigh in on what we’ve learned about President Biden’s cyber security strategy in his first 100 days in office. President Joe Biden declared in mid-December, more than a month before he took office, that cyber security would be a “top priority” of his administration. It should be. The digital world, as we are all now reminded daily, has a direct impact on the real world, for better and worse.

6 Steps To Improve Your Data Security and Data Compliance

Data privacy has been a hot topic in the tech world for years now. With every new technology come new regulations that require companies to completely re-examine the way they handle private data. Most companies already have a basic data privacy policy they constructed alongside lawyers and tech experts to avoid facing serious fines and penalties. However, compliance isn’t just about focusing on current regulations and meeting the bare minimum requirement to avoid legal consequences.