Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

We're Making Our Debut In Cybersecurity with Snowbit

2021 was a crazy year, to say the least, not only did we welcome our 2,000th customer, we announced our Series B AND Series C funding rounds, and on top of that, we launched Streamaⓒ – our in-stream data analytics pipeline. But this year, we’re going to top that! We’re eager to share that we are venturing into cybersecurity!

RKVST Set Free

Today we make RKVST available for public use with a free access tier so you can discover what a Zero Trust Fabric can do for you. From tracking software supply chain lifecycles to nuclear waste, RKVST is a powerful tool that builds trust in multi-party processes, when it’s critical to have high assurance in data for confident decisions. But before going all the way you can start simple: tracking software releases and contents with SBOMs.

Create a Record

In this video, I will walk you through the creation of your first record. To begin, click the yellow Create New button and choose Record. You will notice a dropdown menu allows you to select the type of record you are creating. This allows users to create records of various template types, grouped into categories, each containing a unique collection of field types and functionality within the record. Examples of record types include: logins, payment cards, bank accounts, health insurance and many more. For more information on the Record Types feature, please see the video i’ve linked in the description below.

Crossword Cybersecurity Plc acquires threat intelligence company, Threat Status Limited

Crossword Cybersecurity Plc is pleased to announce its acquisition of the whole of the share capital of Threat Status Limited, the threat intelligence company and provider of Trillion™, the cloud based software as a service (SaaS) platform for enterprise-level credential breach intelligence has now completed.

Why SASE is your best bet to secure a remote workspace

The origins of Secure Access Service Edge (SASE) can be traced back to 2019, when legacy network security systems were extensively used in workspaces. Gartner defined SASE as the combined deployment of cloud-based cybersecurity functions, including Firewall as a Service, a cloud access security broker (CASB), a secure web gateway (SWG), Zero Trust network access (ZTNA), and software-defined WAN (SD-WAN).

Banish Shadow IT With Digital Footprint

It’s out there. In the deep, dark corners of your IT estate, it’s been hiding. Maybe it’s that “killer app” one of the department heads brought back from a trade show. Or maybe it’s that campaign microsite that marketing had a contractor develop for a “skunkworks” launch. Shadow IT is more than an asset management problem. It’s a security problem because you can’t secure what you can’t see.

Build a software bill of materials (SBOM) for open source supply chain security

More than ever, developers are building web applications on the foundations of open source software libraries. However, while those libraries make up the software bill of materials (SBOM) components inventory, not all developers and business stakeholders understand the significant impact on open source supply chain security that stems from including 3rd party libraries.

What Is a SIEM Use Case for Compliance and Security Risk

Due to rising trends and policy changes, organizations are opting for solutions that ensure a proactive measure of cybersecurity. Companies are being held to much higher standards on how they collect, store, and protect individuals’ data. So they are searching for solutions that are both cost-effective and accurate. SIEM software provides threat management along with a detailed and centralized view of enterprise security.