Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CertKit Keystore: Private keys that never leave your infrastructure

When you use CertKit, your private keys live in CertKit’s database, encrypted at rest. We’ve written about why the actual risk is smaller than it sounds. But some organizations have policies that prohibit storing private keys with any third party, regardless of how they’re protected. That policy isn’t going away. The Local Keystore enables those organizations to use CertKit and still keep their keys local.

From Discovery to Defense: Why AI Red Teaming Is the Next Step After AI-SPM

This week, we announced the general availability of Evo AI-SPM, the first operational layer of Snyk’s AI Security Fabric. AI-SPM gives security teams something they’ve never had before: a system of record for AI risk, with the ability to discover models, frameworks, datasets, and agent infrastructure embedded directly in code. For many organizations, that discovery step is a breakthrough.

Top Generative AI Security Risks In The Enterprise

Enterprise security teams spent years building data loss prevention (DLP) programs around a predictable set of egress channels: email, USB drives, cloud storage, and sanctioned SaaS apps. Generative AI has rewritten those assumptions almost overnight. Today, the same data those DLP controls were built to protect is flowing into AI interfaces that most organizations have no visibility into and no enforcement capability over.

Why Your Human Risk Management Strategy Can't Ignore AI

AI isn’t just another technology wave—it’s a force multiplier for both innovation and risk. In a recent webinar featuring insights from Bryan Palma and guest speaker Jinan Budge, Vice President and Research Director at Forrester, one message came through clearly: the rise of AI and AI agents is fundamentally reshaping the human risk landscape—and security leaders need to move fast to keep up.

Introducing the workflow capability matrix

Ever wonder if you're getting the most out of intelligent workflows? Tines' workflow capability matrix (WCM) gives you a complete view of what's possible. The matrix enables you to audit your existing workflows and discover new ideas. By covering core capabilities across security and IT operations, the WCM ensures you're considering the full range of opportunities available. Capabilities covered in the matrix include.

Vulnerability Management as a Service: What Businesses Need to Know

Cyber threats are at an all-time high because the digital world is rapidly changing. Every day, new vulnerabilities are found in security systems. Attacks threaten businesses of all sizes by stealing data, disrupting operations, and damaging reputations. It has become clear that Vulnerability Management as a Service (VMaaS) is an effective managed approach for companies to protect their digital assets without managing security systems themselves.

Why a strategic MVP is needed for scalable software

Minimum Viable Product is the exact opposite of MVP in sports, the Most Valuable Player. One danger is to treat it as the latter by over-investing time and resources into it, missing the point that it's about validating the business idea and core value proposition. But, many also go too far the other way and under-bake the features, treat the core code as disposable, and end up later building the real product on top of a mistreated foundation with technical debt.

Cybersecurity Is Now an HR Issue, Not Just an IT Problem

As organizations become more digitally dependent, the traditional divide between cybersecurity and human resources is quietly dissolving. Cyber risk is no longer confined to firewalls and infrastructure, it lives in behavior, communication, hiring, and culture. The companies that recognize this shift are the ones building true resilience. Below are four expert perspectives that reveal how cybersecurity and HR are increasingly intertwined.

The Next Step in Cyber Risk Management: Decision Simulation

‍At its root, cyber risk management is essentially a forward-looking discipline. The goal has never been solely to understand current exposure, but to determine which actions will reduce it most effectively, given the organization's priorities and constraints. Organizations today can assess control maturity and quantify financial exposure with increasing precision, giving security and GRC leaders a more comprehensive picture of their risk landscape than ever before.

Cyber Resilience: The Key to Maintaining Business Operations

As a child, rubber bands almost seemed magical. They would stretch to fit a size or shape. They could be flung across a room, although not ever at another person and certainly not a sibling. Their resilience means that they would always return to their original shape after being stretched, flung, or twisted.