Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fast Company Recognizes Arctic Wolf as "Most Innovative Company" Alongside Iconic Industry Pioneers

We are excited to share that Arctic Wolf® is ranked 42nd on Fast Company’s Top 50 Most Innovative Companies List, and number 2 in the award’s Security category. This prestigious list recognizes businesses that are making the biggest impact within their industries and on culture as a whole—companies thriving in today’s dynamics. At Arctic Wolf, we constantly innovate because cyber threats are continually impacting our world, whether as organizations or as individuals.

How to use 1Password Families with both friends and relatives

Over the years, we’ve heard of many creative ways friends and families use shared vaults to manage their private information. While “Families” is in the name, 1Password supports every kind of family – whether you live together or separately, and whether you’re blood relatives, friends, or roommates. We want to make sharing personal data easy and secure for you and those you care about.

Random but Memorable - Episode 9.0: Puzzle Solving Developer Community with Stack Overflow

This week, we’re joined by Jeremiah Peschka from Stack Overflow to learn why building communities for developers is so important, and how code is reshaping our world in 2022. In Watchtower Weekly this episode, we also discuss how hacking communities have responded to the conflict in Ukraine and how graphics-chip giant, Nvidia, may have got revenge on its hackers. Plus, if Wordle wasn’t addictive enough, we also take a look at the lesser-known version: PassWORDLE!

Mitigating Risks in Software Supply Chain

By 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains (Gartner) which are only becoming increasingly complex due to the changes in how modern software is built. These trends, together with new federal regulations, require organizations to take action to ensure the security and integrity of their software. But this is easier said than done.

How the Ukraine-Russia Conflict Could Impact Cybersecurity

The Ukraine-Russia conflict has captured the world’s attention, but the physical warfare only tells part of the story. In the weeks leading up to the invasion, seemingly state-sponsored cyberattacks against Ukraine have risen, and now experts fear this may spill over to other nations, too. While much about the conflict remains uncertain, it will undoubtedly have a profound impact on cybersecurity across the globe.

Simplifying container security with Snyk's security expertise

The most beautiful and inspiring aspect about open source code is, well, that it’s open source. We can look at open source packages like gifts that are exchanged between developers across the engineering world, allowing them to learn from the work other people do, contribute their own expertise, and grow their professional capabilities. Contributing to open source is much appreciated, and it is important to remember not only to benefit from these projects, but also to contribute back.

How to Hack Kubernetes (and How to Protect It)

Kubernetes is a valuable resource and a leading container management system in development pipelines across the world, but it’s not exempt from malicious attacks. Using Kubernetes requires a deep understanding of Kubernetes’ environment—including the different vulnerabilities you can be exposed to while creating, deploying, or running applications in your clusters.

How women of Detectify are redefining the security sector for the better

TL/DR: Gender inequality and the lack of women is ubiquitous in tech companies – more so in cybersecurity. While it has been a debate that’s been on for years, more action needs to take place to empower female professionals and founders in the sector. In honor of International Women’s Day, a handful of women at Detectify shared more about what inspires them and how they encourage other women to take up space despite the challenges and thrive in the security industry every day.

3 Strategies for CISOs to Frame Meaningful Security Conversations with Corporate Boards

One chief information security officer (CISO) recently asked me how he should describe SASE (secure access service edge) and zero-trust networking to his company’s directors. My answer was easy: You shouldn’t. As companies revamp their technology infrastructure to leverage cloud efficiencies and enable a remote workforce, cybersecurity is now mission-critical for senior executives and boards of directors.