Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Case Study

NJ TRANSIT Protects the Garden State passengers' economic and social well-being from cyber threats

NJ Transit, the nation's third-largest public transportation provider, delivered more than a quarter of a billion annual passenger trips before the pandemic and is responsible for its riders’ safety, mobility, and livelihoods every day. To ensure nothing interrupts the business, NJ TRANSIT, in partnership with Rubrik, prioritizes a strong data security strategy and is committed to the ongoing and necessary work that gives their data resilience and helps to reduce risk as they face ever-evolving, and inevitable, cyber threats.

Case Study: The Compatibility Challenge of Using Outside Software in Product Development

Whoever you are, whether you’re a developer that intends to contribute to a project or a researcher that seeks to reveal how a project works, consider this: When it comes to facing a large codebase, understanding how the project’s package dependency resolution works is one of the most important and underrated actions one can easily skip.

Viking Yachts Protects Intellectual Property From a Departing Employee (Case Study) | CurrentWare

“CurrentWare saved us a lot of time and money; when the employee was questioned about the data transfer they folded. I cannot thank all of you enough for this software. Being able to audit removable drives is invaluable.” A lot has changed in the world since our first case study interview in 2021 with Vincent (Vinny) Pecoreno, the Network Administrator for Viking Yachts.

Jay Peak: Proactively Preventing Threats to Ensure Operational Stability

On any given day Jay Peak, a Four Seasons Ski Resort in Vermont, has more than 6,000 devices on their network. IT touches just about every facet of the guest and business experience, from network security and point of sale, to building infrastructure and management. It's the responsibility of IT to ensure the entire operation is functioning, 24/7. As a small staff how do they proactively protect their business and guests against potential threats?

CyRC Case Study: Securing BIND 9

Learn how you can improve your application security posture by adopting best practices from the BIND 9 team. All application development teams face the same fundamental questions, from the selection of third-party components to the processes and tools that ensure resilience and security. This article describes how the ISC development team addresses security in the BIND 9 application, one of the foundational applications of the modern internet.

Data Security and Compliance in Fintech

When a leading financial technology provider began posting record success and rapid customer growth, it needed a holistic security strategy to protect its customer data and comply with regulations such as the Payment Card Industry Data Security Standard (PCI DSS) and the California Consumer Privacy Act (CCPA).

SurveyMonkey talks with Snyk about developer security during hypergrowth

Many companies look to CISOs or compliance teams to manage security throughout software development. But this practice usually keeps security considerations separate from developers. CISOs can assign security tasks to developers, but if developers aren’t thinking about security regularly, those tasks may be overlooked.

New York Department of Financial Services Modernizes Regulatory Oversight through Establishing First-of-its-Kind Use Case with SecurityScorecard

New York DFS is working with SecurityScorecard to further support the department’s first-in-the-nation cybersecurity efforts to modernize its supervision process. The New York Department of Financial Services (DFS) is now working with SecurityScorecard to modernize its approach toward regulatory oversight.

Beekeeper Serves Up Secure Communications, Data, and Applications Across Cloud Environments with Sysdig

Beekeeper is known as one of the world’s top platforms for helping remote employees stay connected with their customers, other front-line workers, and the data they need to be successful. Through the company’s platform, employees can gain access to training, forms, and other work-based resources that require flawless access every time.