Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding the Risks of Remote Monitoring and Management Tools

The IT environment is evolving. Organizations have embraced hybrid work models, expanded their operations and personnel footprints, and digitalized their processes and capabilities. And those in charge of these now sprawling environments must deal with the increasingly complicated task of keeping endpoints, users, and more both operational and secure.

What Are OWASP Top 10 Threats & When Will the Top 10 Be Updated?

The OWASP Top 10 is a security research project that outlines the ten most critical security risks to web applications. Published by the Open Worldwide Application Security Project (OWASP), it serves as a widely recognized benchmark for web application security. The list is compiled from data gathered by security experts and organizations worldwide, based on the prevalence, detectability, and impact of various vulnerabilities.

Europe Launches EUVD: A Step Toward Cybersecurity Resilience and Strategic Autonomy

The recent launch of the European Union Vulnerability Database (EUVD) by the European Union Agency for Cybersecurity (ENISA) marks an important moment in the region’s approach to software vulnerability management. Made operational as part of the EU’s obligations under the NIS2 Directive, the EUVD joins a small but critical group of global vulnerability databases – until now led almost exclusively by the US-based Common Vulnerabilities and Exposures (CVE) programme.

Welcome-to-The New Era of AI-Driven Development

Artificial intelligence is no longer a future consideration. It’s here — and it’s changing how software is built. Fast. Enterprise teams are moving beyond AI pilots and proof-of-concepts. They’re rolling out real-world, high-value use cases and doing it at scale. According to IDC forecasting, AI spend will more than double by 2028. At the center of that surge is AI-assisted software development.

AI Is Reshaping Software. Is Your Security Strategy Keeping Up?

Software development is undergoing its biggest shift since the rise of cloud and DevOps. The difference this time? The shift is being driven by artificial intelligence, and it’s moving fast. AI-powered coding tools have rapidly made their way into developer workflows. Agents and LLMs are helping teams move faster, automate more, and build in entirely new ways. But speed often comes with tradeoffs.

How to Choose the Right Exposure Assessment Platform in 2025

Security teams know they need a better way to manage vulnerabilities. What they don’t always know is where to start. That’s where Exposure Assessment Platforms (EAPs) shine—some are even designed to cut through noise, eliminate manual workflows, and prioritize what truly matters. Effective EAPs consolidate findings from across your tools, triage them intelligently, and route them to the right teams for remediation. The promise is huge.

Welcome to Snyk Labs: Charting the Course for AI-Native Security

Software development is in the midst of a monumental shift, powered by the rapid advancements in Artificial Intelligence. AI isn't just changing how we build software; it's transforming the very nature of applications themselves. As AI-native applications become more prevalent, we're also seeing new, complex security threats emerge. Traditional security approaches aren’t designed for the dynamic and often unpredictable nature of Large Language Models (LLMs), agents, and other AI-driven systems.

Outpost24 Named an Overall Leader in 2025 KuppingerCole Leadership Compass Report for Attack Surface Management

Recognition Solidifies Outpost24’s Leadership in Attack Surface Management PHILADELPHIA (May 27, 2025) — Outpost24, a leading provider of cyber risk management and threat intelligence solutions, today announced it has been recognized as an Overall Leader in the 2025 KuppingerCole Leadership Compass Report for Attack Surface Management and is the only European vendor named as an Overall Leader in the report. The company was also named a leader in the Product and Market categories.

Application Security Vulnerability Management: Bridging AppSec and VM for Modern Risk Reduction

Application security has evolved far beyond traditional vulnerability management (VM). Today, security teams face massive scale, increasing complexity, and a constant flow of vulnerability findings that often vanish in hybrid and cloud-native environments. We’ve moved from managing a single virtual machine to dealing with an unlimited number of containers and ECS tasks, many of which only exist for about 15 minutes.

Understanding Common Vulnerabilities and Exposures (CVEs) and Their Role in Deceptive Threat Detection

Cyber threats are becoming more advanced, with attackers creating ways to bypass traditional security. That’s why organizations need a stronger, multi-layered approach to protect their systems. To handle cyber threats effectively, security teams need clear, consistent information. That’s where CVEs help—by making it easier to manage hidden risks. And how can organizations enhance their cybersecurity capabilities with CVE data along with deception technology?