Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is Endpoint Policy Management? Why Intune isn't enough

Most IT and security teams think they already have endpoint policy management in place. They’re using Microsoft Intune. Maybe Defender. Maybe a mix of Mobile Device Management, AV, and EDR. But here’s the catch: delivering policies isn’t the same as enforcing them.

Snyk for Government Achieves FedRAMP Moderate Authorization: A Milestone for Secure Government Software

Today marks a significant milestone for Snyk and, more importantly, for the security posture of the U.S. government. I'm thrilled to introduce Snyk for Government, our FedRAMP Moderate authorized solution for the public sector. This authorization underscores our unwavering commitment to providing secure development solutions that meet the rigorous standards of the Federal Risk and Authorization Management Program (FedRAMP). It means that U.S.

Bridging network identity and endpoint intelligence: DDI Central now integrates with Endpoint Central

In today’s hybrid networks, an IP address is more than a connection point—it’s a digital identity. But for most admins, that identity is still surface-deep. Traditionally, IPAM tools show you which IP addresses are in use, who’s using them, and what vendor the device belongs to. But they don’t tell you whether that device is secure. That changes now. What if every IP handed out by your DHCP server revealed not just what the device is—but how vulnerable it might be?

Using Password 123456 is Bad, but No Password is Worse

An independent cybersecurity researcher claims to have uncovered a breach of an unnamed database containing 184 million records, with exposed information including emails, passwords, and login links. The kicker is that the database was all in plain text and required no password to access. Let’s count how many basic account hygiene rules this breaks—all of them. Yes, more snarkiness, but this type of ineptitude must be called out.

What Are Non-Human Identities, and Why Should Security Teams Care?

Security breaches are increasingly expensive and harder to spot, extending beyond common attacks like phishing. Attackers are now targeting the least visible parts of your infrastructure: non-human identities (NHIs). NHIs outnumber human identities by 45:1 in cloud environments—these include service accounts, APIs, applications, and bots that interact with systems and access sensitive data.

CVE-2025-20286: PoC Available for Critical Cisco Identity Services Engine Static Credential Vulnerability

On June 4, 2025, Cisco released fixes for multiple vulnerabilities, several of which were noted to have publicly available proof-of-concept (PoC) exploit code. The most severe issue, CVE-2025-20286, affects cloud deployments of Cisco Identity Services Engine (ISE) on Amazon Web Services (AWS), Microsoft Azure, and Oracle Cloud Infrastructure (OCI).

Best SAST Tools: Top 10 Solutions Compared

SAST tools automatically scan the source code of an application. The goal is to identify vulnerabilities before deployment. SAST tools perform white-box testing, which involves analyzing the code based on inside knowledge of the application. SAST offers granularity in detecting vulnerabilities, providing an assessment down to the line of code.

CIO POV: Closing the trust gap in SaaS security

“The modern ‘software as a service’ (SaaS) delivery model is quietly enabling cyber attackers and—as its adoption grows—is creating a substantial vulnerability that is weakening the global economic system.” These are the words of JPMorgan Chase CISO Patrick Opet in an open letter to third-party suppliers that has gone viral, at least in the cybersecurity world, and sparked a broader conversation about building trust in cyberspace.