Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Managed Threat Hunting Should Top Every CISO's Holiday Wish List

With the end of the year fast approaching, many of us are looking forward to a well-deserved break. However, security practitioners and security leaders worldwide are bracing themselves for what has become a peak period for novel and disruptive threats. In 2020, the holiday season was marked by the SUNBURST incident, and in 2021 the world grappled with Log4Shell.

How Amazon's new Identity Verification System authenticates Seller Identity

As a new alternative to offline seller onboarding, a new digital onboarding method is being tested by amazon for verifying the identity of merchants online, this biometric verification system uses facial recognition in the form of Face Match for automated identity verification to onboard vendors. According to a post issued from the online business giant – Amazon, the test will be made available to potential sellers in the United States as a voluntary option starting today.

How to Establish a Zero Trust IAM Framework

Enterprises cannot implement Zero Trust cybersecurity without real-time dynamic authorization and authentication for every access request. The principles of Zero Trust and Identity and Access Management (IAM) best practices help fill the gaps that traditional cybersecurity systems often create and ignore.

Netacea Achieves SOC 2 Compliance in Data Security, Availability, Confidentiality, and Privacy

Today, we’re proud to announce that Netacea is officially SOC 2 Type I compliant across four areas: security, availability, confidentiality, and privacy. This significant achievement demonstrates our commitment to keeping customer data safe and secure. While delivering the most accurate bot detection capability in the market, and protecting millions of accounts and transactions daily, Netacea processes and stores trillions of rows of customer data.

The Risks and Benefits of Updating Dependencies

One of the most important steps of securing your code base, your software, and your applications, is to update the dependencies they rely on. In principle, maintaining software health with updates demands that you use recent versions of any software and dependencies. Recent updates are less likely to be exploited and attacked via publicly known vulnerabilities than older versions, because with the latter, malicious actors have had more time to hunt for weaknesses.

The Developer's Guide to Security Hardening

If developers one day considered security a mere ‘good-to-have,’ that day is firmly in the past. As digital transformation accelerates, employee workstations become liabilities for enterprise assets and data, placing cybersecurity in the spotlight. On average, organizations face 130 security breaches annually, and every data breach costs a company around $4.24 million. For better or worse, remote work culture and corrupted credential are the top reasons for security breaches.

3 Reasons Why You Should Fuzz Your Christmas Tree

A recent study shows that software attacks cause Millions of Christmas trees to go dark each year (Claus, 2021). Since many people believe that trees cannot be hacked, they tend to find themselves in a false sense of security that too often leaves them exposed. In this article, I want to show you why fuzzing is the right method to protect your Christmas tree against malicious software attacks while turning it into a video game console.

2023 Cybersecurity Almanac

As we walk towards the end of 2022, full-scale predictions are made about the trends for cybersecurity in the upcoming year: how will cybersecurity affect us, what major cyber threats will dominate the landscape, and, where shall we allocate cybersecurity budgets? Above all, what can we do to secure our businesses and protect our tangible and intangible assets from cybercriminals’ activities?

Six Tips for Safe Enterprise Networks

Network security is a significant topic that all organizations should consider as a major concern. Regardless of the industry, business, or scope of their operations, all enterprises need to have good network security practices in place to protect against cyberattacks. There are a plethora of different security solutions for different needs, and organizations have to figure out what will work best for them and use the resources that they require.

Top takeaways from re:Invent 2022

Live conferences are finally back, and the 11th annual AWS re:Invent did not disappoint. After a virtual 2020 and an in-person reduced-sized edition in 2021, there were more than 52,000 (yes — 52,000!) smiling faces milling about this year’s conference in Las Vegas. As per usual, re:Invent was full of exciting product news and updates. Here are the major announcements that got our attention and some of the things Snyk was up to in Vegas.