Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why does preparing for AI attacks need to be your next big agenda?

This blog has been written by an independent guest blogger. Since its advent, the debate over its ethical and unethical use of AI has been ongoing. From movies to discussions and research, the likely adversarial impact AI has had over the world has been a constant cause of concern for every privacy and security-conscious person out there.

Top CMMC Compliance Challenges Experienced Professionals Encounter

With the deadline to comply with CMMC expected in May 2023, many in the Defense Industrial Base are scrambling to understand how to comply, the tools they need to comply, and the cost to comply. It’s a lot to get right, and there’s a lot riding on it—companies will need to comply if they want to do business with the DoD. That’s why we’ve developed a series of blogs, checklists and other assets to help contractors manage the complexity.

Cybersecurity Sessions podcast: My favorite moments from the first ten episodes

Almost a year ago, I took on a new challenge: Start a podcast about cybersecurity – The Cybersecurity Sessions, hosted by Netacea co-founder and CPO Andy Still. To be honest it’s not always easy finding the time to record the podcast between Andy’s more business-critical duties, but it’s a task he’s looked forward to greatly each month since last November. That’s because, like me, Andy is always seeking out new perspectives and information.

What is Digital Onboarding? Why is it transformative for businesses?

Few things are more crucial for internet businesses than the Digital onboarding procedures for user online. You invest a lot of money into getting people to visit your website, and many companies dedicate entire departments to optimizing it so that visitors turn into customers. Nothing could be further from the truth: the onboarding phase is essential not only for your customer journey but also for fraud and risk reasons.

Offensive Security Migrates to The Underground

Recent years have taught us a lot about espionage in the cybersecurity world. As offensive security companies emerged at almost the same rate as ransomware groups, some got tangled up in diplomatic and political incidents, to a point where the countries that hired them left having to manage their losses. Over the past months, a new trend has emerged of criminal threat groups claiming to have connections to governments worldwide that hire their services for espionage and targeted data leak campaigns.

As Seen in ITWeb: ABAC vs RBAC: How to create data security, avoid permission creep

Demands on data have created a host of challenges for security and administration, and traditional tools are not keeping up. As we expand collaboration and business activities outside the office, data moves more widely and user permissions expand with every responsibility or team project. Keeping ahead of this permission burden is tough yet necessary for zero trust “don’t trust, verify” security.

Passwordless Authentication with Windows Hello for Business

Passwords are everywhere — and nobody likes them. For users, they are a pain to remember and manage. For businesses, they continue to be a primary source of data breaches, both on premises and in the cloud. In fact, the 2022 Verizon DBIR reports that credential theft was involved in nearly half of all cyberattacks, including third-party breaches, phishing attacks and basic web application attacks.

Integrating Snyk Open Source C/C++ security scanning into CI pipelines

Snyk Open Source supports C and C++ scanning for vendored open source dependencies via CLI — and we are happy to share that it is now available via our CI plugins as well. This guide will walk you through integrating C/C++ security scanning within pipelines to get vulnerability information and remediation advice directly to developers. Note that in the scope of this guide, we’ll refer to “C/C++” as just “C++”