Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 key differences between the NIST AI RMF and ISO 42001

The AI space is developing rapidly but is still largely uncontrolled. According to The State of Trust Report 2024, 62% businesses plan to invest more in AI security in the next 12 months. ‍ The good news is that AI security can now be better implemented with the help of many authoritative new AI standards and frameworks rolled out in the past few years. The aim with any of these standards is to remove the uncertainty around AI systems and ensure responsible implementation.

Your Client Requires NIS2 Vulnerability Patching. Now What?

TL;DR: The new EU cybersecurity directive, NIS2, is already reshaping how software suppliers do business through stricter vulnerability management requirements in procurement contracts. This shift is gaining momentum, and more companies will need to adapt. Aikido helps automate compliance reporting and vulnerability tracking to meet these new demands. Start your free compliance journey here, or read on to understand what this means for your business.

Prepare for 2025 Cyberthreats with Research Insights from CyberArk Labs

The year 2025 started with a bang, with these cybersecurity stories making headlines in the first few days: As the global threat landscape intensifies, the need for in-depth research and information sharing has never been greater. Our mission at CyberArk Labs is to empower cyber defenders with threat insights that help strengthen their identity security strategies.

EU Digital Operational Resilience Act (DORA): Are You Ready?

The Digital Operational Resilience Act (DORA) is a disruptive policy that came into effect in January 2025 with the objective to boost the cyber resilience of financial institutions in the European Union. As digital transformation increases, it is crucial to ensure the availability, integrity, and confidentiality of critical IT systems to sustain financial market trustworthiness and stability.

3 Trends that Will Shape Cyber Threat Intelligence in 2025

The growing use of AI outside and within organizations is rapidly changing the threat landscape and impacting our approach to threat detection, investigation, and response. As we kickoff 2025, the following three trends suggest that cybersecurity practitioners must continue to advance their use of threat intelligence and are making important progress on that front.

Demonstrating reduction of vulnerability classes: a key step in CISA's "Secure by Design" pledge

In today’s rapidly evolving digital landscape, securing software systems has never been more critical. Cyber threats continue to exploit systemic vulnerabilities in widely used technologies, leading to widespread damage and disruption. That said, the United States Cybersecurity and Infrastructure Agency (CISA) helped shape best practices for the technology industry with their Secure-by-Design pledge.

Snyk Recognized as Trusted Partner and Innovator by JPMorganChase

Snyk is the trusted partner for financial services companies, empowering them to modernize application security while safeguarding critical infrastructure. Backed by industry leaders, we are committed to exceeding expectations, driving innovation, and redefining security for financial services. This is one of the reasons Snyk was recently inducted into JPMorgan Chase’s Hall of Innovation, for our central role in helping them to build the future of banking securely.

Snyk Security Labs Testing Update: Cursor.com AI Code Editor

Snyk’s Security Labs team aims to find and help mitigate vulnerabilities in software used by developers around the world, with an overarching goal to improve the state of software security. We do this by targeting tools developers are using, including new and popular software solutions. With the meteoric rise in AI tooling – specifically the fast-growing field of AI-enabled development environments – we have been including such software in our research cycles.