Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

8 Steps to a Successful Cloud Data Migration

It is rare nowadays to hear of a business strategy that doesn’t entail a cloud strategy. So it comes as no surprise that 85% of organizations are expected to embrace a cloud-first principle by 2025, as estimated by Gartner. But migrating all your organization’s data, applications, and business processes to a new environment can be daunting.

FedRAMP Cloud Service Providers and Services

Google adopted its cloud infrastructure, Google Cloud Platform (GCP), to be compliant with FedRAMP. GCP earned a FedRAMP High authorization to operate (ATO) for several cloud products in a handful of locations and has uplifted the current FedRAMP Moderate services to more products and locations. Government agencies can now work with the highest level of classified information using GCP.

Security Service Edge (SSE) is a Profound Moment for Cloud, Data, and Network Security

Today we are very excited to share that Netskope has been named a Leader in the 2022 Gartner ® Magic Quadrant ™ for Security Service Edge (SSE). This Magic Quadrant for SSE* is the first such SSE analysis of its kind, and I invite you to read the full SSE report (available here) to learn how Netskope was recognized for its completeness of vision and ability to execute.

Breaking the Chain: Are You the Unintended Victim of a Supply Chain Attack?

We’ve heard a lot about “supply chains” of various industries over the past couple of years, and the cybersecurity sector is no exception. When Colonial Pipeline was compromised by ransomware, it affected the physical supply of gasoline to consumers. On the software side, malware distributed through a SolarWinds update and vulnerabilities discovered in Apache’s Log4J created rippling effects for organizations around the world.

Apple Cyber Attacks: Mobile Devices Still at Risk

Apple iPhone users are one of the largest targets when it comes to cyber-attacks. Apple uncovered its biggest hack in history last November, which went undetected for five years. At the time they alerted users who had fallen victim to the colossal Apple cyber attack. The hack targeted Apple’s iCloud service and was able to gain access to users’ photos, videos, and other personal information.

Best Practices and Pitfalls for Using Open Source Components in Fintech

Financial technology companies are at the forefront of banking evolution, driving innovation and fighting to stay ahead of both the large bank behemoths and the next wave of fintech companies coming along behind them. In this webinar, Peak6 Director of Open Source, and Snyk Field CTO and Field CISO, discuss best practices for secure development in highly regulated Fintech companies.

Welcoming Fugue as we build the future of developer-first cloud security

Today, I am excited to announce Snyk’s acquisition of Fugue and welcome their team to the Snyk family. The addition of Fugue to Snyk’s platform will allow us to continue our mission to help developers find and fix security issues in the applications they create, by providing visibility into the security of applications and the cloud services they use. But it’s about more than just visibility of the cloud posture.

Cloud Transformation: Leveraging Existing IT Investments

Digital transformation has forever changed the way healthcare organizations deliver care. By pivoting to cloud based platforms, health systems can liberate data from silos and connect it in ways that enable them to gain insights, take action and collaborate across a patient’s care journey.