Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Building AI Trust with Snyk Code and Snyk Agent Fix

Many businesses are using AI to innovate and boost productivity. But to truly benefit from AI, you need to trust it. That's where the Snyk AI Trust Platform comes in. As we announced at the 2025 Snyk Launch, the Snyk AI Trust Platform is designed to unleash innovation, reduce business risk, and accelerate software delivery in the age of AI.

Introducing Veracode Package Firewall: Your First Line of Defense Against Software Supply Chain Attacks

Open-source and third-party packages drive innovation but expose your software supply chain to relentless cyberattacks. Veracode’s 2025 State of Software Security (SoSS) report reveals a chilling truth: 70% of critical security debt originates from third-party code.

The 10 Most Costly GDPR Mistakes Banks and Financial Institutions Make

Financial services firms operate in a high-risk environment where personal and financial data converge — and errors are expensive. Despite robust back-end controls, many still: GDPR’s complexity — 99 articles and multiple regional interpretations — creates audit friction even for mature teams.

A Clicking Time Bomb: What To Do About Repeat Clickers

I recently had several conversations about repeat clickers. First with a Forrester analyst and then, shortly after, at KB4-CON Orlando following a presentation on the subject by Matthew Canham, Executive Director of the Cognitive Security Institute. After that, my approach was a little less organic: intrigued by the topic, I spoke with several KnowBe4 customers to find out how they manage repeat clickers.

FTC States That Scams Cost U.S. Consumers $158.3 Billion in One Year

I am used to repeating some pretty big numbers when talking about the financial impact of cybercrimes. When you look into the data, it is pretty easy to start talking about tens of billions of dollars. I occasionally come across figures that are in the hundreds of billions of dollars in damage across multiple years globally. So, imagine my surprise when I learned the U.S. Federal Trade Commission (FTC) said Americans lost $158.3B in 2023, one year, to scammers, and that annual figure is getting worse.

5 Multi-Cloud Environments

Multi-cloud environments have become the backbone of modern enterprise IT, offering unparalleled flexibility, scalability, and access to a diverse array of innovative services. This distributed architecture empowers organizations to avoid vendor lock-in, optimize costs, and leverage specialized functionalities from different providers. However, this very strength introduces a significant challenge: increased complexity in security management.

AI Agents Take DC: Inside Washington's Developing Agentic Security Agenda

AI Agents have become one of the most discussed emerging technologies in enterprise environments, and now, they’ve captured the attention of policymakers in Washington, DC. Over the past several weeks, a series of developments have brought AI Agents into the national spotlight, particularly through the lens of cybersecurity and regulatory preparedness.

Cursor's One-click Install MCP in Action

In this video, I’m checking out the brand new Cursor 1.0 release and testing one of its most exciting new features — the one-click MCP install. Setting up MCP servers has never been this easy! Join me as I walk through the process, share my first impressions, and see how smooth (or not) the setup really is. If you’ve been curious about Cursor or want to simplify your MCP workflows, this one’s for you.

Security and SRE: An Example from Datadog's Combined Approach

In most companies, Security and SRE organizations are distinctly separate entities and often fall under different executive branches of the company. The work of Security and SRE organizations may appear different, but their goals are the same: keep the company running. This separated structure hinders collaboration, but what if you could change it? Over the past year, Datadog has joined our SRE and Security teams together in a single organization unifying all aspects of reliability.

Building a Threat Intelligence Management Strategy with XDR

Is your security team stopping threats before they enter, or just reacting after damage happens? Because in the current era of advanced cyber threats, a reactive approach isn’t enough. There must be a proactive defense strategy, fueled by threat intelligence! Extended Detection and Response (XDR) solutions help organizations stop attackers, spot weaknesses, and stay protected with cyber threat intelligence data.