Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Evolving the Snyk CLI through an extensible approach

Every day, thousands of developers use the Snyk CLI as part of their development workflow, to identify and resolve security issues in their code as early as possible. What if these developers and other security professionals could harness the power of this dev-first approach and also utilize entirely new security analyses, filters, and workflows via an extensible approach?

Random but Memorable - Episode 10.1: Zero Trust Rap Edition with George Finney

On today's show we welcome best-selling author, George Finney, to the show to discuss his latest book: Project Zero Trust: A Story about a Strategy for Aligning Security and the Business. Tune in to find out his 5-step methodology for implementing Zero Trust in your organization.

Coffee Talk with SURGe: ESXi servers, Royal Mail ransomware, Gamaredon, Password Sharing, Bard AI

Grab a cup of coffee and join Ryan Kovar, Audra Streetman, and special guest David Bianco for another episode of Coffee Talk with SURGe. The team from Splunk will discuss the latest security news, including: David and Ryan also competed in a 60 second charity challenge to share their take on Netflix's anticipated crackdown on password sharing. The trio also discussed Google's Bard AI chatbot, which was introduced as a competitor to ChatGPT.

Introducing Torq Parallel Loop

Introducing Torq Parallel Loop Torq is proud to introduce Parallel Loop, a new capability that enables users to process bulk data from myriad security tools with unprecedented ease. It also provides the power of orchestration like no other automation tool in the security automation industry with true parallelism. That means multiple tasks can be run simultaneously, and optionally, on multiple elastically-scaled compute resources, shortening the time workflow automations take to complete by 10x or more.

Social Networking Without Selling Yourself

A truism about the free tools online is that if you aren’t paying for the service, then you are the product. Take your grocery store's “club” card program. You sign up and give them your name and phone number, and every time you shop, you swipe your card and get discounts on certain items. If you shop at the same store all the time, it makes total sense to take advantage of these discounts to save yourself some cash.

Safer Internet Day 2023: Protecting Your Personal Data

February 7th is the 20th Safer Internet Day, a day to focus on addressing ways to reduce the risks created by our now very online world. Painting the internet as an inherently dangerous place full of predators and … would be using too broad a brush. The internet is an amazing technology - an information sharing resource unrivaled in depth, breadth, and reach. Despite all the good, useful, and fun the internet brings, it has one major drawback: on the other end of the computer is a person.

How to Secure Your Home WiFi Network

Wireless devices on your home networks can include everything from PCs, phones and tablets to IP cameras, voice assistants, smart TVs and connected appliances. Simple precautions you take to secure your home WiFi network will help prevent cybercriminals from accessing your devices and stealing your data. You can secure your WiFi network by creating a separate guest WiFi network, turning on your router’s encryption, using a VPN for further protection and more.

Enterprise Password Management: Single Platform vs. Multiple Solutions

An IT challenge as old as Software as a Service (SaaS) exists in every corner of the organization — whether to have a single technology vendor or multiple solutions. In some organizations, this is the case for password managers. And since software features vary, there are compelling reasons that lead an organization to have a single solution or more than one.

What's the Difference Between HTTP vs HTTPS?

One of the biggest indicators of a suspicious or unsecured website is whether or not the site is HTTPS-secured. In many cases, spoofed, phishing, malicious, or typosquatted websites use HTTP instead of HTTPS, which has encryption and verification protocols built in to ensure safe data transmission between servers and browsers. The main difference between HTTPS and HTTP is that HTTPS establishes a secure internet connection via encryption, whereas HTTP does not.