Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Smarter ticket handling with AI and the new wave of orchestration

In this guest post, Connor Brewer, Principal Solutions Architect at Uzado - a Canadian-based IT and security service provider - showcases an innovative IT help desk app built with AI in Tines, which boasts countless other potential applications. For many IT and security teams, outdated orchestration and automation solutions create more challenges than solutions.

Beyond SIEM: Transform Into a Data-Driven Organization With Devo

The Devo Platform has earned its reputation as a powerful and innovative force in Security Information and Event Management (SIEM). Customers rely on Devo to detect and respond to threats in real time, gain complete visibility into their security posture, and streamline their security operations. But the core strengths that make Devo a SIEM leader – unmatched scalability, real-time analytics, and flexible customization – also enable us to solve a variety of other data challenges.

Innovating to Secure Software Supply Chains: Veracode Acquires Phylum, Inc. Technology for Enhanced Software Composition Analysis

The rise of emerging open-source threats presents a growing risk to organizations as attackers increasingly exploit vulnerabilities in widely used libraries, frameworks, and tools. In fact, most Software Composition Analysis (SCA) tools on the market today are unable to keep up with the volume of new overtly malicious activities in the open-source ecosystem.

Managing identities in a growing organization: Lessons from SECURA Insurance

Joe Albers, Senior Information Security Engineer at SECURA Insurance, shares how effective identity management is crucial for compliance and security in the insurance sector. In this video, Albers discusses the challenges SECURA Insurance faced in managing identities as they grew from 600 to 1,100 employees. Timely deprovisioning and secure access to critical applications was a top priority during the transition from manual processes to automation, which the company achieved seamlessly with One Identity Manager.

Track and manage open source risk across your application portfolio with Black Duck SCA | Black Duck

Learn how your security teams can take a proactive approach to managing open-source risk using Black Duck Software Composition Analysis (SCA). Join us as we explore the process of analyzing scan results, addressing new CVEs, and prioritizing remediation efforts. Key Highlights: Discover how Black Duck SCA empowers teams to surface, understand, and prioritize findings efficiently, ensuring software security and compliance.

Securing the Digital Future: AppSec Best Practices in Digital Banking

On November 12th, 2024, at the Pavilion Hotel in Kuala Lumpur, Snyk’s Field CTO, Pas Apicella, delivered an insightful presentation at the Digital Banking Asia Summit 2024 in Malaysia. Titled, ‘Securing the Digital Future: Best Practices for Application Security in Digital Banking’, his talk focused on actionable strategies to address pressing challenges in the financial services industry.

SAQ A-EP: Top 5 Actions Merchants Must Take to comply with PCI DSS 4 Requirements 6.4.3 and 11.6.1 by March 31, 2025

SAQ A-EP is a key focus of the Payment Card Industry Data Security Standard (PCI DSS) version 4, which introduces changes affecting merchants. Designed for e-commerce merchants who partially outsource their payment processing but have website elements impacting transaction security, SAQ A-EP ensures compliance with these updated requirements. This article clarifies these changes and outlines the top 5 actions SAQ A-EP merchants should take before March 31, 2025.

Credential Phishing Increased by 703% in H2 2024

Credential phishing attacks surged by 703% in the second half of 2024, according to a report by SlashNext. Phishing attacks overall saw a 202% increase during the same period. “Since June, the number of attacks per 1,000 mailboxes each week has increased linearly,” the researchers write. “Currently, we are capturing close to one advanced attack per mailbox each week. As we reach the 1,000 threshold, this translates to nearly one advanced attack for every single mailbox each month.

What Is Behavioral Cloud Application Detection and Response (CADR) and Why It's Essential for Cloud-Native Security?

In this blog post, we will introduce the concept of behavioral Cloud Application Detection & Response (CADR). In case this is the first time you have heard of CADR, we’ll start by explaining that concept and explain why it’s essential for protecting modern applications. Let’s go.