Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

What is CASB in Cyber Security?

Businesses increasingly use cloud services like Google Workspace, Amazon Web Services (AWS), Hubspot, and Dropbox to improve work productivity and drive innovation. However, this accelerated shift to cloud platforms has exposed businesses to new security challenges, such as unauthorized data breaches and compliance violations. A Cloud Access Security Broker (CASB) is a powerful tool against these issues, delivering unmatched visibility and control over data to protect enterprises against these threats.

CIO POV: Impactful AI Programs Start with 'Why'

Generative AI (GenAI) has the power to transform organizations from the inside out. Yet many organizations are struggling to prove the value of their GenAI investments after the initial push to deploy models. “At least 30% of GenAI projects will be abandoned after proof of concept by the end of 2025, due to poor data quality, inadequate risk controls, escalating costs or unclear business value,” according to Gartner, Inc.

Dive into AI and LLM learning with the new Snyk Learn learning path

Snyk Learn, our developer security education platform, just got better! We have expanded our lesson coverage and created a new learning path that covers the OWASP Top 10 for LLMs and GenAI, and is entirely free! As AI continues to revolutionize industries, ensuring the security of AI-driven systems has never been more critical.

ChatGPT vs Cyber Threats: The REAL Role of AI in Cybersecurity

Unlock the truth about using Large Language Models (LLMs) in cybersecurity - are they the next big thing or just another trend? In this episode of Razorwire, your host, James Rees, brings together cybersecurity expert Richard Cassidy and data scientist Josh Neil to talk about the use of AI and large language models (LLMs) in cybersecurity and their role in threat detection and security. Join us for a discussion on the capabilities and limitations of these technologies, sparked by a controversial LinkedIn post.

CrowdStrike Drives Cybersecurity Forward with New Innovations Spanning AI, Cloud, Next-Gen SIEM and Identity Protection

Today’s threat landscape is defined by adversaries’ increasing speed and quickly evolving tactics. Now more than ever, it is imperative organizations unify and accelerate their security operations to detect, identify and respond to threats at the rapid pace of the adversary. This isn’t always straightforward.

Inside the Cloud: Unintended Privileges

This is the third article in a series about cloud-based attack vectors. Check out our last article about Cloud-Based ransomware! As Identity Access Management (IAM) becomes more complex, it becomes possible for an attacker to exploit the capabilities of legitimate permissions alone or in combination, escalating privileges and gaining potentially devastating levels of access. Because these privileges are legitimate, these attacks can be difficult to detect until the damage is already done.