Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Exploring the Risks of Read-Only Access in the Cloud

My career began with read-only access. In my first job, I worked night shifts in a data operations center. Our team handled incidents identified either by monitoring or from end customers. This meant I often had to perform first, second and third-line troubleshooting. If we couldn’t identify and resolve the issue, our only option was to wake up a rather exhausted escalation engineer.

Three reasons to invest in an ASPM solution in 2024

The pace of software development is astounding! The transition to agile, DevOps, cloud, and the supercharged use of AI is empowering distributed development teams to build software with greater speed and autonomy. In contrast to the remarkable strides in development methodologies, maintaining a robust security posture has become a formidable challenge. AppSec teams are still playing catchup, both outnumbered and out-resourced.

Protecting Sensitive Data with Egnyte in Today's Threat Environment

In light of recent attacks against on-premises file server appliances affecting organizations of all sizes and industries, it has become clear that, in many cases, companies would be better suited to choosing cloud solutions for their secure data management needs. There are many great products on the market capable of providing easy access to files persisted in your local network.

Cloud Threats Memo: Extracting Training Data from Generative AI Language Models

This year will probably be remembered for the revolution of ChatGPT (the website was visited by 1.7 billion users in October 2023, with 13.73% of growth compared to the previous month) and for the widespread adoption of generative AI technologies in our daily life.

Introducing Snyk AppRisk Essentials

Snyk AppRisk Essentials is Snyk’s first ASPM offering, designed to help AppSec teams boost their Snyk-based developer security program. The solution helps Snyk customers automatically discover the different assets used to build their applications, manage coverage to ensure these assets are being secured properly by Snyk, and better prioritize issues based on the risk they pose to the business.

The complete guide to compliance risk management

To build a successful business you’ll need to acquire new customers, save on costs, and avoid major pitfalls that could impact your bottom line. An important aspect of this is managing your organization's compliance risk. These include the risk of penalties, legal judgments, and other issues that could come as a result of not complying with legal regulations and industry standards.

Random but Memorable - The Festive Quiz Special ft. Jack Rhysider and Carole Theriault

It's our final episode of the year! We’ve pulled together a panel of special guests for the fun and festive Security Quiz of the Year - 2023 edition. 🎄📝🎅 Podcasting royalty, Jack Rhysider from Darknet Diaries and Carole Theriault from Smashing Security, join the panel to help us unpack another year in cybersecurity. Bring on the belly-laughs! 🤣 We also crown the ultimate winner of HackerNoHacker in the grand finale, and unveil our brand new game for 2024: Security Blank. 🥳👑

What Are Dark Web Scans?

Dark web scans, also known as data breach scans, are scans that let you know if your personal information, such as your email and login credentials, is on the dark web. There are several free and paid dark web scans available online to use and each of them works differently. Continue reading to learn what the dark web is, how dark web scans work and how to initiate a dark web scan.