Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Monitor and optimize payment processing with Datadog's Adyen integration

Adyen is a global payment platform that supports transactions across web, mobile, and in-person channels. By consolidating payment flows into a single process, the platform helps merchants simplify operations and deliver consistent purchasing experiences. But payment processes are complex, often involving multiple steps that include authorization, capture, and refunds.

Nightfall Product Updates & News: July/August 2025

This summer has been big for Nightfall. From launching Nyx, our AI copilot for DLP, to expanding our detection capabilities across more platforms, we’re making it easier than ever for security teams to protect sensitive data without slowing down work. In this update, you’ll find new AI-driven features and platform enhancements designed to make your DLP workflows smarter, faster, and more precise.

Understanding Network Vulnerabilities and Mitigating Their Risks

Driving along on a dark highway late at night, you feel a jolt and hear a metallic crushing sound as your car hits an unknown object in the road. You nervously continue on your journey, until you see a bright light flashing on your dashboard. Your oil pressure is low because your car has been leaking oil since you hit that unknown object on the highway. Much like an unknown object in the road that leads to a slow leak, a network vulnerability can lead to a devastating data leakage or breach.

How Fireblocks Is Powering CBDC and Stablecoin Innovation Through Project Acacia

Project Acacia is a research initiative led by the Reserve Bank of Australia (RBA) and the Digital Finance Cooperative Research Centre (DFCRC) that explores how digital forms of money—including central bank digital currencies (CBDCs), stablecoins, and deposit tokens—can support the development of wholesale tokenized asset markets in Australia. Project Acacia is being conducted in two phases.

Agentic Container Security with Snyk MCP Server

Did developers steal the spotlight of agentic workflows with the wave of AI coding assistants sweeping the media, startups, and tech? What about DevOps workflows, container security, and operating system vulnerability scanning? One of the most time consuming tasks of application security engineers and those responsible for production artifacts is tracking Common Vulnerabilities and Exposures (CVEs) and in what way they impact a bundled application.

ISO 27001:2022 Requirements Explained for 2025

ISO/IEC 27001:2022 provides a framework for managing information security using an Information Security Management System (ISMS). The October 2025 deadline to upgrade from the previous ISO 27001:2013 standard is coming fast, and organizations yet to transition risk losing their certification. Maintaining ISO/IEC 27001 certification is especially relevant for regulated industries, SaaS providers with enterprise customers, and global organizations handling sensitive data.

PCI SSF Compliance Explained: Infographic for Payment Software Vendors

In today’s rapidly evolving digital payment landscape, software security is no longer just a best practice—it’s a necessity. The PCI Software Security Framework (PCI SSF) sets the global benchmark for safeguarding payment applications and ensuring they are developed with security at the core. Whether you’re creating payment gateways, POS applications, or mobile payment apps, compliance with PCI SSF demonstrates that your software meets stringent security requirements.

From Fragmented to Unified: Driving Autonomous Endpoint Management Across Mobile and Computing Devices with the Tanium Connector for Microsoft Intune

The Tanium Connector for Microsoft Intune enables organizations to unify, manage, and report on all their endpoints—including those across multiple Intune tenants—through a single platform, streamlining security and operations workflows.