Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Your guide to SaaS compliance: Key areas and best practices

Many IT managers find compliance to be one of the most complex aspects of the SaaS space. For instance, in a LogicMonitor survey on cloud solutions, 60% of the respondents highlighted governance and compliance as one of their top challenges when engaging with SaaS platforms. ‍ SaaS compliance requires adherence to various standards and regulations that can present a recurring workload for security teams in any industry.

Mitigating Image Integrity Violations: A Real-World Example in Runtime Environments

In the never-ending quest to speed up software release cycles, ensuring the security and integrity of application artifacts has never been more critical. As applications are continuously built, tested, and deployed, every element of the software pipeline—from source code to container images—needs to be trusted and verifiable. A key aspect of maintaining this trust is image integrity protection and validation.

Addressing Cyber Risk and the Rise of AI

In this episode of CISO Conversations: EU Data Regulations, Pierre-François Guglielmi, EMEA Field CISO at Rubrik, is joined by Trish McGill, an Executive Subject Matter Expert for Cyber Security IT/OT at De Heus Voeders and Nobian, Brian Wagner, Chief Technology Officer at Revenir, and Tim Clements, Owner of Purpose and Means. Together, they explore the impact of cyber-attacks and data regulations on business resilience, particularly concerning critical infrastructure, and how these factors ultimately affect profits.

Proactive App Connector Monitoring with Machine Learning

App connectors are a critical component of the Netskope secure access service edge (SASE) platform, offering visibility into user activities based on their interactions with cloud applications. These connectors monitor various types of user actions, such as uploads, downloads, and sharing events in apps like Google Drive and Box, by analyzing network traffic patterns.

Glimmer Of Good News On The Ransomware Front As Encryption Rates Plummet

No-one would be bold enough to say that the ransomware problem is receding, but a newly-published report by Microsoft does deliver a slither of encouraging news amongst the gloom. And boy do we need some good news - amid reports that 389 US-based healthcare institutions were hit by ransomware last year - more than one every single day.

The History of Cybersecurity: Key Moments in Technology and Privacy

For Cybersecurity Awareness Month, we are taking a look at the past, present, and future and looking at key moments from the history of cybersecurity. Because of our past technology, we are able to explore limitless possibillities with technology that shapes how we work, communicate, and consume media.

1Password product enhancements [Fall edition]: Autosave, sharing, getting started, and more

Based on our commitment to making 1Password a helpful, intuitive, and easy-to-use password manager, we’ve focused on enhancing even more key features, all thanks to your feedback.

Top 20 Insider Threat Tools Heading Into 2025

Insider threats (aka insider risks) have become a growing concern for organizations across industries. These threats come from individuals within an organization who have authorized access to sensitive data and systems but misuse them for personal gain or to cause harm. Many organizations are turning to insider threat software to combat this issue, which helps identify, detect, and mitigate insider threats before they cause significant damage.