Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

June 2024

Veeam Names 11:11 Systems VCSP of the Year for Eighth Time

When former University of Tennessee women’s basketball coach Pat Summitt retired in 2012, she had more wins than anyone in college basketball history. And yet, when asked about winning, the Vols legend is famously quoted as saying: “Winning is fun … Sure. But winning is not the point. Not giving up is the point. Never letting up is the point. Never being satisfied with what you’ve done is the point.”

Securing a Lifeline: Why Identity Security is Paramount in Healthcare

In the intricate healthcare ecosystem, cybersecurity is akin to the human immune system – a vital defense that safeguards the body from external and internal threats. Healthcare cybersecurity is essential for protecting patient data, ensuring medical service availability and maintaining compliance across the medical industry. The future of healthcare is increasingly digital, and its security depends on the strength of identity security measures.

The Biggest Cybersecurity Challenges CISOs Face Today

CISOs face more cybersecurity challenges today than ever. As technology gets more advanced, so do the bad guys. Cyberattacks are becoming more clever and dangerous. On top of that, there’s no shortage of rules, regulations, and personal risk that CISOs must navigate. We surveyed 200 CISOs to better understand the biggest challenges they face today. Here’s some of what we learned.

Security Posture Drift: Tracking & Managing Security Posture Over Time

Given the high level of complexity in securing enterprise IT systems, it can be extremely difficult to keep track of changes in the organization’s overall security posture. It’s even more complicated to ensure that the dozens of security controls in place to protect the organization’s IT (and OT) assets are functioning properly and configured securely.

Beyond IT: The Organization-Wide Benefits of Password Managers

Government IT managers are tasked with an ever-growing list of responsibilities, from IT infrastructure to operations, equipment, systems administration and security. IT teams are also directly responsible for protecting sensitive government information, including Personally Identifiable Information (PII) like names, addresses, driver’s license numbers, forms of payment, Social Security numbers and financial records.

Navigating NIS2 Requirements: Transforming Supply Chain Security

Talking to fellow CISO’s around the globe - and in particular Europe - the topic of cybersecurity regulations and compliance has taken on a new life. Most recently, the Network and Information Security (NIS 2) Directive is the latest regulation shaking up the region. NIS2 is much more than an update though—it's transforming the cybersecurity landscape of the EU.

Into the Rat's Nest: A SenseOn Analysis of the NetSupport RAT

Threat actors prefer deploying tools which appear genuine and expected in a business IT environment. This provides camouflage for their toolset, blending into organisations' application portfolios. NetSupport Manager, a remote access tool, has been utilised by system administrators since its release in 1989 and has been used by threat actors since at least 2016.

Talk to us about Snyk CLI

At the end of April 2024, we introduced Semantic Versioning and release channels to Snyk CLI, changes that were well received by our customers. Building on that momentum, we aim to design the CLI so that it not only helps you do your job well but also brings you joy in doing so. We invite you to accompany us on this path to discover together. In today’s blog post, Neil and I, the design and product duo for Snyk CLI, will share the following three things with you.

Call for action: Exploring vulnerabilities in Github Actions

To address the need for streamlined code changes and rapid feature delivery, CI/CD solutions have become essential. Among these solutions, GitHub Actions, launched in 2018, has quickly garnered significant attention from the security community. Notable findings have been published by companies like Cycode and Praetorian and security researchers such as Teddy Katz and Adnan Khan.