Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Financial Institutions in New York Face Stricter Cybersecurity Rules

Boards of directors need to maintain an appropriate level of cyber expertise, incidents must be reported within 72 hours after determination, and all ransom payments made must be reported within a day. Those are just some of the changes made by The New York State Department of Financial Services to its Cybersecurity Requirements for Financial Services (23 NYCRR 500), effective November 1, 2023.

Secure Access Control in 2024: 6 Trends to Watch Out For

Secure access control, part of the broader field of user management, is a key concept in the realm of information security, particularly in the business environment. It refers to the process of selectively restricting and allowing access to a place or resource. In the context of information technology, it is a vital element of data protection, dictating who or what can view or use specific resources in a computing environment.

3 Considerations to Make Sure Your AI is Actually Intelligent

In all the hullabaloo about AI, it strikes me that our attention gravitates far too quickly toward the most extreme arguments for its very existence. Utopia on the one hand. Dystopia on the other. You could say that the extraordinary occupies our minds far more than the ordinary. That’s hardly surprising. “Operational improvement” doesn’t sound quite as headline-grabbing as “human displacement”. Does it?

Snyk achieves AWS Security Competency

We are thrilled to announce that Snyk, a leading provider of cloud native application security solutions, has achieved the prestigious AWS Security Competency status. The AWS Security Competency validates Snyk's deep security expertise and commitment to delivering a comprehensive application security solution for modern organizations building and running their applications on the Amazon Web Services (AWS).

Gartner CTEM Starts with EASM

External Attack Surface Management(EASM) has emerged as a cybersecurity gold standard – a core component of modern cybersecurity programs. As digital organizations have grown more complex, getting the whole picture of the external attack surface – what’s connected to what and how this could pose danger – is a maze that only-world-class EASM solutions have been able to successfully navigate.

Trustwave Threat Intelligence Briefing: The 2023 Retail Services Sector Threat Landscape

The holiday shopping season is teed up for its annual explosion of spending. Retailers know this, consumers know this, cybercriminals know this, and are unfortunately ready to take advantage of any weak link that can be found to steal vital consumer and business data. However, unlike gift buyers heading to stores or shopping online on Black Friday and Cyber Monday, these adversaries are not seasonal actors.

Stronger Together: Protect Your Organization with the Power of the Community

Cybersecurity is a team sport, as malicious actors and advanced persistent threats are constantly evolving their tactics. In this ever-changing landscape, it is crucial for organizations to collaborate and learn from one another’s experiences. At Devo, we recognize the importance of teamwork in combating these threats. We are committed to enhancing our product capabilities and content to empower every customer to participate in this collective defense.

7 Essentials for Cloud Compliance Success

Step into a future where your business isn’t just operating in the cloud – it’s thriving there, bulletproofing customer trust and data like a fortress in the sky. It sounds like something from a sci-fi novel, but guess what? With the magic of cloud compliance, this futuristic vision is already coming to life. The cloud is home to 83% across the globe.

Fireblocks releases experimental open-source Token Balance Verification extension with light client

The Fireblocks research team has released an experimental open-source Chrome extension for the verification of token balances on block explorers and portfolio websites. The extension is the first real-world application on Ethereum which utilizes trustless light client technology, and is a step forward in our commitment to continuously advance blockchain security.

Is your software supply chain secure?

As you begin developing your application to get services in front of your customers, you will notice a lot of processes and contributors are involved—from development to production. All of these processes and people are part of the “software supply chain.” It goes without saying that your software supply chain plays a crucial role in ensuring your business’s success.