Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What are the Differences Between Encryption and Signing? Why Should You Use Digital Signatures?

While we have all used digital security certificates like SSL/TLS, code signing certificates, or others, many don’t know the security technology behind them. Stringent security standards ensure that the cyber threats looming around us never get to our digital systems. Due to such threats, there’s a constant advancement happening in data security technology to protect sensitive information. Encryption and Signing are two methods used widely for data security.

Unlock Any CLI Using Your Fingerprint With 1Password Shell Plugins

With 1Password Shell Plugins, you can forget about storing insecure plaintext keys on disk or manually typing credentials or MFA codes into your terminal. Instead, sign on to any CLI with your fingerprint. Install & configure the relevant plugins for your toolchain via the 1Password CLI and you’re all set. You can even build and contribute your own plugins as needed via the open-source community project.

The Cyber Security Skills Shortage

Whether you are training to become an information security professional or if you are more seasoned in the cyber security industry, this is an episode you don’t want to miss. In this episode, I am joined by Josh Davies and Keith Christie-Smith to talk about what the cyber security skills shortage means for the industry and how we can address this.

How to Sign Kubernetes using Sigstore

In this livestream we are joined by Adolfo Veytia, Staff Software Engineer at ChainGuard and Tech Lead on the Kubernetes SIG-Release team, as we talk about they were able to tackle signing all of the Kubernetes v1.24 image artifact using Sigstore. We then demonstrate signing an image and vulnerability scan result attestations with Sigstore's cosign utility. Didn't catch the live stream? Ask all of your Snyk questions and we’ll do our very best to answer them in the comment section.

Hackers Are Using These 3 Techniques to Bypass MFA

There’s no denying that multi-factor authentication (MFA) is an essential security measure that significantly improves an organization’s cyber posture. However, there is no silver bullet in cybersecurity. Though multi-factor authentication proves extremely helpful, determined and resourceful cybercriminals can still find techniques to bypass it. Let’s look at some frequently-used methods cyber-attackers leverage to bypass MFA.

4 Expert Tips for Data Center Security

In a market projected to grow to $288.30 billion by 2030, data centers will expand to facilitate more data-driven workloads, including AI and big data. Much of this expansion continues to occur in the cloud, as companies seek to reap the benefits of low-cost infrastructure that they can spin up as needed. In fact, research shows that cloud workloads represented 94% of all data center workloads worldwide in 2021.

What Is Cyber Insurance?

Cyber insurance is a specialized insurance policy that was created to protect businesses from the losses that can occur as a result of cyber attacks. The size of your business does not matter when it comes to needing cyber insurance, and it shouldn’t be your only priority when it comes to your business’s cybersecurity. Read on to learn more about cyber insurance coverage and its cost.

The What, Why and How of Auto-Remediation in Cybersecurity

When you’re facing a cyberattack, waiting even just minutes to respond could be the difference between business as usual and a calamity. It may only take that long for threat actors to exfiltrate sensitive data or disrupt critical systems. That’s one reason why automating remediation is an essential ingredient in an effective cybersecurity strategy.

The Top Cyber Attacks of November 2022

November has turned cold in much of the Northern Hemisphere, and there was plenty of cold comfort to go around in the world of cybersecurity. Our latest round-up looks at a massive company that can’t stop getting breached, another one scrambling to correct an unforced error, a worst-case scenario for the blending of church and state, and a depressing report on just how much money ransomware gangs are pulling in. Let’s get ready for a dip into the chilly waters of cybercrime.