Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

8 Privileged Access Management (PAM) Best Practices for Cloud Infrastructure

Even the simplest mistakes can leave your data wide open to cyber threats. If the worst happens and there’s an attack, cybercriminals gain free-for-all access to your cloud resources. They tamper with your data, disrupt workflows, and steal sensitive information, meaning the need for Privileged Access Management (PAM) best practices are more indispensable than ever for any robust cloud security strategy.

How To Achieve Zero-Standing Privilege in Your Organization

Your organization can achieve zero-standing privilege by following best practices such as enforcing least privilege access, implementing Just-in-Time (JIT) access and continuously monitoring and auditing privileged access. Following these best practices ensures that privileged access is granted only when necessary, and for the shortest duration possible, significantly reducing your organization’s attack surface and enhancing overall security.

Securing Patient Privacy: Techniques for De-identifying Healthcare Data

Protecting patient privacy is vital in the healthcare industry. The rise of digital records has made safeguarding sensitive information more challenging. De-identifying healthcare data ensures compliance with regulations like HIPAA while protecting patient information. Key concepts include PHI (Protected Health Information), de-identification, and the safe harbor method.

Operational Resilience Deadlines Are Coming Soon

With increasing cyber threats, data breaches, and the rapid pace of digital transformation, operational resilience has become a top priority for financial institutions. As we begin 2025, this is especially true in the UK, because of new regulations going into effect. Regulatory bodies like the Financial Conduct Authority (FCA), Prudential Regulation Authority (PRA), and the Bank of England have introduced stringent rules to safeguard the stability and resilience of the financial services sector.

Smarter ticket handling with AI and the new wave of orchestration

In this guest post, Connor Brewer, Principal Solutions Architect at Uzado - a Canadian-based IT and security service provider - showcases an innovative IT help desk app built with AI in Tines, which boasts countless other potential applications. For many IT and security teams, outdated orchestration and automation solutions create more challenges than solutions.

Beyond SIEM: Transform Into a Data-Driven Organization With Devo

The Devo Platform has earned its reputation as a powerful and innovative force in Security Information and Event Management (SIEM). Customers rely on Devo to detect and respond to threats in real time, gain complete visibility into their security posture, and streamline their security operations. But the core strengths that make Devo a SIEM leader – unmatched scalability, real-time analytics, and flexible customization – also enable us to solve a variety of other data challenges.

Innovating to Secure Software Supply Chains: Veracode Acquires Phylum, Inc. Technology for Enhanced Software Composition Analysis

The rise of emerging open-source threats presents a growing risk to organizations as attackers increasingly exploit vulnerabilities in widely used libraries, frameworks, and tools. In fact, most Software Composition Analysis (SCA) tools on the market today are unable to keep up with the volume of new overtly malicious activities in the open-source ecosystem.

Securing the Digital Future: AppSec Best Practices in Digital Banking

On November 12th, 2024, at the Pavilion Hotel in Kuala Lumpur, Snyk’s Field CTO, Pas Apicella, delivered an insightful presentation at the Digital Banking Asia Summit 2024 in Malaysia. Titled, ‘Securing the Digital Future: Best Practices for Application Security in Digital Banking’, his talk focused on actionable strategies to address pressing challenges in the financial services industry.

SAQ A-EP: Top 5 Actions Merchants Must Take to comply with PCI DSS 4 Requirements 6.4.3 and 11.6.1 by March 31, 2025

SAQ A-EP is a key focus of the Payment Card Industry Data Security Standard (PCI DSS) version 4, which introduces changes affecting merchants. Designed for e-commerce merchants who partially outsource their payment processing but have website elements impacting transaction security, SAQ A-EP ensures compliance with these updated requirements. This article clarifies these changes and outlines the top 5 actions SAQ A-EP merchants should take before March 31, 2025.

Credential Phishing Increased by 703% in H2 2024

Credential phishing attacks surged by 703% in the second half of 2024, according to a report by SlashNext. Phishing attacks overall saw a 202% increase during the same period. “Since June, the number of attacks per 1,000 mailboxes each week has increased linearly,” the researchers write. “Currently, we are capturing close to one advanced attack per mailbox each week. As we reach the 1,000 threshold, this translates to nearly one advanced attack for every single mailbox each month.