Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

How Malicious NPM Packages Make Your Apps Vulnerable

During this live stream we had a conversation with Zbyszek Tenerowicz (ZB) where he discuss how we can be susceptible to malicious packages as developers. Didn't catch the live stream? Ask all of your Snyk questions, and we’ll do our very best to answer them in the comment section. Snyk helps software-driven businesses develop fast and stay secure. Continuously find and fix vulnerabilities for npm, Maven, NuGet, RubyGems, PyPI and more.

FROGBOT : Securing your git repository! What is new!

GitHub Security Alerts! Support for Yarn 2... Frogbot scans every pull request created for security vulnerabilities with JFrog Xray and in version 2.3.2 it even opens pull requests for upgrading vulnerable dependencies to a version with a fix! With Frogbot installed, you can make sure that new pull requests don’t add new security vulnerabilities to your code base alongside them. If they do, the creator of the pull request has the opportunity to change the code before it is merged.

Authenticated | Arctic Wolf

In the first episode of Authenticated, Arctic Wolf Chief People Officer Dan Schiappa and Arctic Wolf Research and Development VP Daniel Thanos, detail the unique opportunity that Arctic Wolf Labs has to help reduce alert fatigue for security practitioners, serve the public good, and lead the industry in innovation by combining leading-edge AI with human intelligence.

GDPR & HIPAA Compliance- Mapping the Similarities and Differences

Is your organization looking to achieve both HIPAA and GDPR Compliance? Well, believing that achieving compliance with one will automatically ensure compliance with the other regulation isn’t really true. So, based on this notion, if you are looking to achieve compliance with both HIPAA and GDPR, then here is an interesting webinar video that you should watch to get clarity on this aspect.

Should You Worry About Ransomware Attacks?

Over $800,000 - that’s the cost of the average ransomware payout last year. 66% of mid-sized organizations and about 37% of global organizations got hit. (Sources cited below) Attackers have developed new techniques that a lot of companies aren’t aware of or prepared for. For example, the demand for ransomware as a service has hugely increased, resulting in many more organizations being hacked every day.

Building Modern Access-Control for Cloud Applications with Or Weis | SnykLIVE Recording

With the growing complexity of modern applications and microservices based architectures getting access-control right has become a huge ongoing pain-point, as companies find themselves reimplementing access-control over and over. Solutions are found in the new tool sets of policy as code, as well as the 5 best practices and open-source tools (e.g. OPA, OPAL, Zanzibar) we can use to face the challenge.