Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Impact of GDPR on Cloud Service Providers

Cloud computing is an integral part of most businesses globally. Technology has transformed the way businesses operate and thrive in the industry. However, the cloud industry has been facing huge challenges when it comes to complying with various data protection and data privacy standards. With the enforcement of the General Data Protection Regulation (GDPR), a lot has changed for most businesses.

Snyk: Stranger Danger Live Hacking Session

There's no better way to understand container security than by seeing some live hacking! During this interactive session Simon Maple, Snyk's VP of Developer Relations & Community will introduce the state of docker security by reviewing vulnerabilities in docker images and their impact on applications. This hacking session will provide you with security best practices for building docker container images. Each successful hack will help you better understand the mistakes you can make, their implications - and how you can avoid them.

Snyk: The State of Infrastructure as Code Security

The adoption of infrastructure-as-code and configuration-as-code is soaring with the rising popularity of technologies like Kubernetes and Terraform. This means that designing and deploying infrastructure is a developer task, even if your "developer" is an infrastructure architect, and, just like application code, configurations can use test-driven methodologies to automate security prior to deployment.

INETCO

INETCO provides real-time transaction performance monitoring, payment fraud detection and on-demand analytics solutions for omni-channel banking, ATM self-service networks and payment processing environments.

Expert advice on approaching HIPAA data security

At its core, HIPAA compliance is simply about maintaining patient privacy by ensuring the appropriate access to and use of patient data by your users. Electronic Health Record (EHR) solutions provide detail around when patient data is accessed, but without visibility into what users do with sensitive patient data after they access it, the risk of data breaches, compliance violations, and the investigations, fines, and reputational damage that comes with them, is significantly increased.

Reporting a GDPR data breach

In order to understand how to report a data breach, we first have to know what a data breach actually is. Under the GDPR, a personal data breach is “the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data.” This covers a wide range of scenarios, some of which might be surprising. The following would all be considered as data breaches under the GDPR.