Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Announcing Insights: Helping you focus on top risks for your organization

Modern applications are built, deployed and, run in increasingly complex and dynamic environments. Assessing and prioritizing the security issues introduced by these applications without taking this context into account inevitably leads to focusing remediation efforts on the wrong set of issues. This not only results in real risk slipping under the radar but also wastes the valuable time of developers, increasing their frustration and eroding their trust in security.

SnykLaunch June '23: Insights and DeepCode AI enable faster fixes and prioritization

As we approach the second half of 2023, both security and development teams are seeing seismic shifts in the application security world. DevOps practices continue to evolve, meaning that developers are introducing code more and more rapidly, andwith the help of AI, developers of all kinds are able to create code faster than ever. Plus, apps aren’t just made up of first-party code and third-party dependencies anymore.

Introducing parlay, a tool for enriching SBOMs

The increasing adoption of software bill of materials (SBOM) standards are starting to drive better interoperability between security tools. The NTIA’s work on defining a minimum set of elements for an SBOM was a key part of that, especially with multiple formats like CycloneDX and SPDX in widespread use. But with work on SPDX 3.0 and CycloneDX 1.5 progressing, there are lots of things we can do with the SBOM formats beyond the minimum elements.

What can you do with an enriched SBOM? A parlay quickstart guide

We just released parlay, a new open source tool that can enrich SBOMs with additional information. You can read more in the announcement blog post. In that post, we briefly mentioned why this is important for decision-making based on SBOM data, but thought a few quick examples might be interesting. parlay can add a lot of extra information to an SBOM, and we can use that information to write more powerful policies.

Attack Surface Intelligence (ASI) Data Updates: Enhancing Threat Research Capabilities

In the ever-evolving cybersecurity landscape, staying ahead of potential threats is crucial. Attack Surface Intelligence (ASI) is vital in identifying vulnerabilities and mitigating risks. This blog post will discuss the latest data updates in ASI and the exciting developments within our threat research group.

WatchGuard Wins Two Fortress Cyber Security Awards

We’re thrilled to share that Business Intelligence Group has named WatchGuard as a winner in the Organizational Excellence category and recognized WatchGuard CEO Prakash Panjwani with a prestigious Leadership Award at this year’s Fortress Cyber Security Awards! This annual program recognizes the top companies, executives, and products from around the world leading the charge in preparing, defending and responding to growing cybersecurity threats.

Streamline Co-editing Microsoft Documents with Egnyte

As part of our ongoing commitment to providing a seamless co-editing experience to Egnyte users, we have introduced new enhancements that enable Windows and Mac users to open any Microsoft Office-supported file such as Word, Excel, and PowerPoint, and start or join a co-editing session directly from the Microsoft Office App. Users can also co-edit in real time using the Egnyte Desktop, Online or Mobile versions.

Prakash Panjwani Named "CEO of the Year" at 2023 Tech Ascension Awards

Today, we are proud to share the exciting news around WatchGuard CEO Prakash Panjwani’s big win at the annual Tech Ascension Leadership Awards – taking home the program’s prestigious “CEO of the Year” title for 2023! The Tech Ascension Awards program recognizes the top technology companies and leaders driving cutting-edge, innovative solutions to solve critical challenges in their respective markets.

Corporate KYC: How to Verify and Onboard Businesses

Corporate KYC, also known as KYC of Company, is the process of screening a business or corporate body and its beneficiary owners for AML/KYC compliance. This blog article will teach you about KYC Requirements for Corporates, the Corporate KYC process, what information a corporate client must submit, and how corporate KYC procedures may be automated using simple technologies.