Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is VISS the Right Fit for Production Vulnerability Management?

Tech companies love a good framework, especially ones that promise structure, transparency, and alignment with internal standards. Zoom’s Vulnerability Impact Scoring System (VISS) is one of those. It’s designed to translate internal security policies into a scoring model that supports impact-based decision making, particularly for bug bounty programs and external disclosure workflows. On paper, that sounds useful. But in practice, it doesn’t scale.

The Hidden Costs of False Positives in Healthtech Security

When we talk about healthcare today, it’s impossible not to consider application security. As healthcare providers increasingly lean on digital solutions to deliver patient care, they are creating an explosion of healthcare data requiring protection to ensure its confidentiality, integrity, and availability.

Snyk Joins CISA's Secure by Design Pledge

As the Chief Information Security Officer at Snyk, my primary role is to ensure the security and integrity of our products, our systems, and our customers' data. But my responsibility extends beyond our walls. It involves championing a vision for a more secure digital world—a vision I am proud to say we share with the U.S. Cybersecurity and Infrastructure Security Agency (CISA).

Base44 Vulnerability Sparks Conversations on Securing Vibe Coding

The recent revelation of a critical vulnerability in Base44, a prominent vibe coding platform, has spotlighted the intricate relationship between innovation and security in AI-assisted development. Researchers at Wiz uncovered a flaw in the platform that allowed unauthorized access to private enterprise applications, exposing sensitive data and raising urgent questions about the security of vibe coding practices.

How to translate CVSS scores into financial impact: A CISO's risk quantification guide

In this article Chief Information Security Officers (CISOs) face the daunting task of balancing technical cybersecurity risks with the financial realities of their organization. One critical component in this balancing act is the use of vulnerability scoring systems, in particular, the CVSS score. This article provides a detailed guide on how to translate CVSS scores into tangible financial impact estimates using proven methods of risk quantification.

SquareX Researchers Reaffirms their Browser Security Thought Leadership with Multiple Vulnerability Disclosures in Key Black Hat and DEF CON 33 Talks

SquareX will be disclosing multiple key research findings at Black Hat USA and DEF CON 2025 this August. Through multiple talks, the researchers will be revealing critical architectural vulnerabilities in passkey authentication systems, enterprise DLP and browser extensions.

Secure at Inception: Introducing New Tools for Securing AI-Native Development

At Snyk, we believe you should never have to choose between speed and security. As the age of AI transforms software development, our goal is to extend our developer-first security approach to this new era, providing the essential tools your teams need to build with confidence. Today at Black Hat, we are delivering on that vision with three tangible innovations that offer a comprehensive solution to secure the entire code lifecycle with AI.