Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Regulatory Compliance 101: What You Need To Know

To operate legally and ethically, every company, no matter the size or type of organization, must be aware of the laws, regulations, and industry standards that govern them. Though many businesses may view regulatory compliance as a burden, it does not have to be this way. The benefits of following these rules greatly outweigh the consequences. Organizations can ensure the safety and well-being of their employees, customers, and the general public by following these regulations.

The Evolution of Security and Identity is Key to Successful Digital Transformation

The Evolution of Security and Identity is Key to Successful Digital Transformation. Not a day goes by when we don’t hear about yet another data breach or sophisticated compromise. As a result, there cannot be a C-Suite executive that is unaware of the cyber threats their organisation faces, either through guidance from their security teams or the constant media reporting of ransomware or data theft as a result of successful cyber-attacks.

10 Dynamic Principles for Crafting a Robust Database Security Strategy

The digital world relies on data, which because of its considerable value, is constantly targeted by skilled cybercriminals who have spent years developing methods and tools to gain access to even the most secure databases. Never mind those databases whose owners only pay lip service to security. Traditional security approaches that focus on network perimeters are no longer sufficient in today's evolving threat landscape.

Email Continuity for Microsoft 365

The Importance of Email Continuity Email is the lifeblood of many organizations. It serves as a primary channel for communication, document sharing, scheduling, and collaboration. When email services experience downtime due to various reasons such as server issues, maintenance, or cyberattacks, businesses can face significant challenges: Microsoft 365: A Powerful Email Solution Microsoft 365 offers a robust and feature-rich email service through Exchange Online.

What Is Social Engineering with Email?

Understanding Social Engineering Social engineering is a psychological manipulation technique used by cybercriminals to deceive individuals into divulging confidential information, performing specific actions, or making financial transactions. These attacks prey on human psychology rather than exploiting technical vulnerabilities. Social engineering attacks can take various forms, and email is a common vector for such schemes.

Priorities from the OpenSSF Secure Open Source Software Summit 2023

Snyk has been a long-time active participant in and sponsor of the Open Source Security Foundation (OpenSSF). We’re there because we believe in supporting its mission of securing the open source ecosystem. A recent summit meeting convened by the OpenSSF with the White House brought together various US Government departments for a chat about open source security.

High severity vulnerability found in libcurl and curl (October 2023)

On October 3, 2023, Daniel Stenberg, the long-time curl maintainer and original author, published a note on both LinkedIn and X (formerly Twitter) regarding the shipping of curl version 8.4.0, which will contain a fix for "probably the worst security problem found in curl in a long time." This issue should be taken seriously as curl maintainers have been vocal about downplaying the risk associated with most vulnerabilities reported against curl in the past (a recent example is the article CVE-2020-1990

CIS Hardening and Configuration Security Guide

The Center for Internet Security (CIS) published an updated version for the CIS Controls- CIS Controls v8. The CIS Controls are a set of gold standard guidelines for organizations facing data security issues. These controls were developed to simplify and help IT ops and security teams to remain focused on the essentials. The CIS updates its recommendation according to changes and new discoveries in the Information Security field. The 8th version of the CIS Controls was published in May 2021.

Opportunists Sneak into Darkbeam: 3.8 Billion Usernames and Passwords Exposed

Darkbeam is a top-performing cyber vulnerability and threat management provider with less than 25 employees. The company has reported over $1 million of revenue in recent years, with numbers as high as $5 million. Their recent acquisition by ApexAnalytics will hopefully increase these statistics, but numbers mean nothing if Darkbeam cannot rebuild its reputation. Darkbeam is the most recent company to suffer over 3 billion records stolen during a data breach.

Advancing Digital Resilience in the Financial Sector

Financial entities throughout the European Union are preparing for the Digital Operational Resilience Act (DORA), a new piece of legislation to strengthen the digital resilience of credit institutions, investment firms, insurers, and more. DORA focuses on breach prevention and cyber resilience, meaning financial institutions must prioritize both protecting their attack surface and incident response planning.