Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Snyk Workflows - Basic Workflows (IDE & CLI)

Snyk integrates with your IDEs, repos, workflows, and automation pipelines to add security expertise to your toolkit. The “menu” of options available to you is extensive, so we created this three-part series to get you started and running. The first session covers basic workflows in the IDE and CLI. You’ll learn to proactively plan how to leverage Snyk in different places and different ways. We will cover basic workflows and how to use them, as well as quick tips.

Industry Insights: Arctic Wolf Keeps MinnWest Bank's Customer Data Safe

As a regional operation deeply rooted in the community, MinnWest Bank understands how important it is to make sure their customers’ personal and financial data is secure. By partnering with the Arctic Wolf® Security Operations Model, this Minnesota financial institution understands risks better, is able to react to threats with confidence, and gained visibility across their environment — all with 24x7 expert support.

Stranger Danger: Your JavaScript Attack Surface Just Got Bigger

Building JavaScript applications today means that we take a step further from writing code. We use open-source dependencies, create a Dockerfile to deploy containers to the cloud, and orchestrate this infrastructure with Kubernetes. Welcome - you're a cloud native application developer! As developers, our responsibility has broadened, and more software means more software security concerns for us to address.

Hello CISO - Episode 7: Secrets management and infrastructure

Secrets management isn't just about usernames and passwords anymore, so how do you protect an infrastructure comprised of physical machines, virtual machines, and people all constantly exchanging secrets? In this episode of Hello CISO, Troy's talking secrets: how to protect them, and why the old way of thinking won't cut it anymore. To learn more about 1Password Secrets Automation, the new way to secure, orchestrate, and manage company secrets, visit 1Password.com/secrets.