Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Keeper Named a G2 Leader in Multiple Cybersecurity Categories, Fall 2024

Keeper Password Manager was rated as a leading enterprise, mid-market and small business password manager for Fall 2024 by users on G2, the world’s largest and most trusted software marketplace. Keeper Security was also named a leader in password management globally, with distinctions in the Europe, Middle East and Africa (EMEA), Canada and Asia-Pacific regions, and named a high performer and momentum leader across 10 cybersecurity categories, earning a total of 53 badges.

Introducing The Riscosity AI Governance Suite

Clients can empower their employees to securely leverage any browser-based AI tool. The Riscosity browser extension will scan and block prompts with sensitive information in real time. Admins can use the intuitive Riscosity dashboard to set RBAC rules and keep a pulse on any AI tools being used – including any attempts to share sensitive information. The bottom line… we’re providing an AI firewall for your company, without the headaches of difficult deployment.

Security in FinTech: Q&A with Dan Kindler, co-founder & CTO of Bound

Hi, I’m Dan Kindler and I’m the CTO and co-founder of Bound. We focus on making currency conversion and hedging cheap, fair, and most of all, easy. Our platforms help hundreds of businesses protect themselves from currency risk across the world. Currently, about half of our team is composed of engineers.

Combating Content Theft: Maximize Revenue by Securing Your Content

Content scraping is on the rise. While it can benefit your business in some cases, it can also lead to lost revenue, degraded website performance, and content theft. Web scraping is a hot topic in tech news. This trend links to the rise in AI tools, specifically LLMs (large language models), which rely on content to generate their outputs. They scrape content from across the web to train these algorithms. This is a controversial subject with moral, technical, and legal implications.

Real-Time Secrets Security for Developers with GitGuardian's Extension for Visual Studio Code

Enhance your secure coding practices with GitGuardian’s Visual Studio Code extension. Detect secrets in real-time by embedding security into developers' workflows, boosting productivity and ensuring compliance.

How to Use Teleport Machine ID and GitHub Actions to Deploy to Kubernetes Without Shared Secrets

We are living in the era of Kubernetes. It is hard to find anyone who has not heard of it and in all likelihood you are using it, too. And if you are using Kubernetes, it is probably also safe to assume that you areusing CI/CD to deploy your applications into it. However, as CI/CD and Kubernetes have grown in popularity, the number of bad actors looking to exploit weaknesses in them has grown too.

Analyze Taint Analysis Faster with Improved Contextual Dataflow in Snyk Code

Snyk Code is a powerful tool designed to help developers identify and automatically fix vulnerabilities in their source code. It eliminates flow interruptions and repeated work by detecting and resolving security issues in real time with over 80% autofixing accuracy. It integrates seamlessly with your development workflow, providing real-time feedback on security issues directly within your IDE, CLI, or SCM.

Foundations of trust: Securing the future of AI-generated code

Generative artificial intelligence (GenAI) has already become the defining technology of the 2020s, with users embracing it to do everything from designing travel itineraries to creating music. Today’s software developers are leveraging GenAI en masse to write code, reducing their workload and helping reclaim their valuable time. However, it’s important developers account for potential security risks that can be introduced through GenAI coding tools.

A Guide to Cybersecurity Documentation

The tip of the spear for every cybersecurity program should be a robust set of cybersecurity documentation that defines required activities and expected behavior. For most organizations, cybersecurity documentation includes policies, standards, and procedures, although other kinds, such as regulations and guidelines, may exist as well. The implementation of cybersecurity documentation is a governance control that can lessen risk and comply with legal and regulatory requirements.

Why the Sysdig Windows agent matters in the cloud

The Sysdig Windows agent is a game-changer for cloud infrastructure, particularly when it comes to securing Windows containers in Kubernetes environments. While many endpoint protection agents are designed to provide security for traditional Windows hosts, Sysdig goes a step further by incorporating Kubernetes-specific context into its system introspection.