Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

The states of data, Part 1: Why you should protect data at rest, in use, and in motion

What do Morgan Stanley, Samsung, and a New York credit union all have in common? They aren’t of the same scale, do not cater to the same customer needs, nor do they store similar data. But, if there’s one thing in common between these three organizations, it’s that they’ve all been victims of a data leak. Morgan Stanley, the banking conglomerate, suffered a data leak due to sheer negligence of handling data at rest.

Meet Snyk for Government: Our developer security solution with FedRAMP ATO

The Snyk team is excited to announce that our FedRAMP sponsor, the Center for Medicare and Medicaid (CMS), has granted authorization (ATO), enabling their teams to leverage our public sector offering, Snyk for Government (SFG). This stage signifies that we are almost at the finish line of the FedRAMP process and points to our continued investment and support of public sector organizations in their application security efforts.

Insider Threats: The Danger Within

Cyberattacks by hacking groups using ransomware and other tactics dominate the headlines, but the risks posed by individuals within an organization can be just as, if not more, damaging. CISA defines an insider threat as the possibility that authorized personnel will use their access, either intentionally or unintentionally, to harm an organization’s mission, resources, information, systems, or other assets.

AI in cybersecurity 101: The economics of bot vs bot battles

If you run an online image search for “cyber hacker,” you’ll likely find countless pictures of shadowy, hooded figures hunched over a laptop. There’s just one problem with those search But here’s the catch: The image of a human hacker is in the minority these days.

SAP Users: Prevent leaks during closed accounting periods with HaloCORE

There’s no ‘good’ time for a data breach, but accidentally leaking sensitive information during closed periods leads to heavier financial and reputational costs than at other parts of the year. As SAP holds public companies' most sensitive financial and HR data, executives must guarantee the security of thousands of SAP downloads or face non-compliance fines and legal repercussions.

Data Security in AI Systems: Key Threats, Mitigation Techniques and Best Practices

Artificial Intelligence (AI) has evolved into a vital part of modern businesses. Its reliance on large amounts of data drives efficiency and innovation. However, the need for data security in AI systems has grown critical with this increasing dependence on AI. Sensitive data used in AI must be protected to avoid breaches and misuse. This post will explore critical threats to AI data security, discuss mitigation techniques, and present best practices to help organizations safeguard their AI systems.

How Did My Personal Information Get on the Dark Web?

If you realize that your personal information has been found on the dark web, you may be wondering how this could have happened. Your personal information could have ended up on the dark web through a data breach, a compromised account, a phishing scam or a malware infection. The dark web is part of the internet used by cybercriminals to buy and sell stolen information. Continue reading to learn how to tell if your personal information is on the dark web, how it got there and how to protect your identity.

How To Detect and Remove a Keylogger

You can detect a keylogger if you notice unfamiliar apps on your device, slower performance speeds, a lag in mouse movements or strange background noises on phone calls. A keylogger is a type of malware that requires an entry point, such as an email or cloud program, to be installed on your device. Once it is on your device, a cybercriminal can monitor every keystroke you make to learn your login credentials and private information.