Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Elevate Infrastructure Resiliency and Engineering Velocity with Infrastructure Identity

Speakers: Jack Poller, Principal Analyst at Paradigm Technica Ev Kontsevoy, CEO & Co-Founder at Teleport The Identity Attack Era: Is Your Infrastructure Secure? Cyberattacks are evolving, and identity compromise is now the primary tactic used by adversaries to infiltrate organizations. With credential theft, phishing, and social engineering driving most breaches, traditional security measures struggle to keep up. At the same time, the complexity and scale of modern infrastructure—spanning distributed systems, multi-cloud access, and AI-driven operations—have vastly expanded the attack surface.

Overcoming AppSec Challenges in FinServ: How CIBC Balances Speed, Security, and Compliance

Financial institutions face a tricky balancing act: they need to innovate quickly while also following strict compliance rules in an environment where security is paramount. Recently, Snyk's Field CTO, Steven Schmidt, sat down with Mihai Saveschi, Senior Director of Security Service Management at CIBC, for a fireside chat to discuss these pressing issues. We’ve pulled key insights from their conversation on some of the most pressing AppSec challenges facing financial services organizations today.

What Is ARMO Behavioral CADR?

As organizations increasingly adopt cloud-native architectures, they face a sprawling attack surface with novel threats that traditional security measures struggle to manage. ARMO’s Behavioral Cloud Application Detection and Response (CADR) offers the precise solution to these problems. It is designed to address the complexities and challenges of securing cloud-native applications in runtime.

Maximising the Value of Threat Intelligence

To stay ahead of evolving cyber threats, it’s not just data that is needed—it is actionable intelligence. With the increasing complexity of attacks, regulatory pressures, and resource constraints, it’s essential to have a proactive approach to threat management. This whitepaper, Maximising the Value of Threat Intelligence, is a strategic, actionable guide tailored for CISOs and security teams.

Understanding Cybersecurity for SCADA

Industrial facilities increasingly rely on interconnected systems to improve operations. As they implement these technologies into their legacy environments, they create new cybersecurity risks within previously isolated Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) by connecting them to public internet-facing applications.

APIs: The New Target for AI-Powered Attacks

With the rapid evolution of artificial intelligence (AI), attackers are now leveraging machine learning (ML) to mount sophisticated attacks on Application Programming Interfaces (APIs). These AI-powered threats, including adaptive bots, automated vulnerability scanning, and synthetic identity generation, represent a new wave of risks that traditional defenses are unable to address effectively.

Secure your CI/CD pipelines from supply chain attacks with Sumo Logic's Cloud SIEM rules

Supply chain attacks, particularly those targeting continuous integration/continuous delivery (CI/CD) pipelines, are on the rise. It’s easy to think of these attacks as something that only happens to others, but the reality is that your organization is part of the supply chain too. Whether your company develops software for internal use, offers it as part of a service to your customers, or sells it as a product, you’re exposed.

Key Takeaways from the KnowBe4 2025 Phishing Threat Trends Report

Our latest Phishing Threat Trends Report explores the evolving phishing landscape in 2025, from renewed tactics to emerging attack techniques. Ransomware may be an “old” threat, but new tactics are making people more susceptible than ever. In this edition, we break down a highly advanced attack detected by KnowBe4 Defend that bypassed native security and a secure email gateway (SEG)—and would have been nearly impossible to stop if launched.