When businesses think about maintaining cybersecurity, the first thing that comes to mind is often endpoint and network security. However, web application security is becoming increasingly important. There have been numerous high-profile attacks on web applications in recent years; in 2020, for instance, the Twitter accounts of famous people were compromised as part of a bitcoin scam.
If you’re a Python developer looking to easily secure your applications, you’re in the right place! Snyk helps you secure all the code making up your Python app — your own code, the open source libraries you’re pulling in, your containers, and your infrastructure as code (IaC) — by integrating seamlessly into your existing development workflows. The Snyk platform is comprised of four products, each designed to help you secure the different building blocks in your Python app in the most frictionless way possible.
Imagine, it’s a Saturday morning and you receive a call from a bank: – Hello? – Hi [insert your name], we suspect that a fraudster is trying to use your card at a grocery store in Texas. – Well, I am at a grocery store in Texas! – Oh my gosh! Do you see him? If only credit card fraud was funny.
It seems as if everything is happening in the cloud now — whether I’m sharing a document with a colleague or backing up family photos. This is happening in cybersecurity as well, where the storage flexibility and computing power of the cloud have enabled new ways to secure organizations. To speak to that trend, I recently joined Hank Schless on the Endpoint Enigma podcast to discuss the difference between using security that runs inside data centers versus security delivered from the cloud. (A while back, Lookout Chief Strategy Officer Aaron Cockerill talked a bit about this as well in the context of the Microsoft Exchange attack).
The open ports in your hardware could be critical points of vulnerability if services they are exposed to them are misconfigured or unpatched. Unfoftunalrty, many organizations are currently exposing their sensitive resources through such malicious connections, heightening the risk of ransomware attacks, supply chain attacks, and data breaches. Fortunately, there are free tools available that can detect all of the open ports in your ecosystem so that you can then assess the level of criticality of each exposure. In this post, we discuss the 5 best free open port scanners you can start using today to check for open ports in your ecosystem.
The internet of things (IoT) is a highly developed space that is home to a vast amount of sensitive data, making it a very attractive target for cybercriminals. Threats and risks continue to evolve as hackers come up with new ways to breach unsecured systems -- posing a threat to the ecosystem itself. Let’s take a look at the leading threats and risks to the IoT and the associated vulnerabilities that must be secured.
We all know how cyber security has become an increasingly important issue as the reliance on internet-connected devices has increased. This is why some companies are looking for third-party providers to handle their IT security needs to free up resources and reduce costs. Find out what you should be looking for in a provider, as well as why outsourcing cyber security can be a good option for some businesses.
Regardless of size, every company could experience a cybersecurity incident one day. Security incidents can occur in companies, public institutions, schools, etc. Cybersecurity incident actions are similar to actions to be taken in response to a security incident, for example in a school. It is an inevitable reality that your network may be exposed to an incident threat. Security incidents may cause issues like cybercrime, data loss, and service outages that threaten daily work, and this can seriously affect your company in terms of cost, productivity, and reputation. Because of that, the greater the extent and damage of the incident, the more forceful your actions to take in response must be.
We in cybersecurity just love new, buzzy acronyms. The latest is “XDR,” otherwise known as extended detection and response. No doubt, you’ve already read an article, watched a webinar, or listened to a podcast on XDR. Jon Olstik and Dave Gruber of cybersecurity research firm, ESG, wrote several articles in the summer of 2020 in which they defined XDR as: Funny thing about definitions and categories – if you talk to 10 different security analysts or vendors (and we have), you’ll get 10 different definitions. This is no less true for XDR. You’ll also get 10 different opinions on where XDR evolved from.
Kubernetes version 1.22, the latest release of Kubernetes, comes with bug fixes, enhancements, and new features that make the platform more stable, scalable, and user-friendly. There are a total of 56 improvements with different maturity levels and a considerable number of API removals. In this article, I’ll focus on the security-related changes in Kubernetes as well as a few other significant changes in Kubernetes API and usability. You’ll find notable security changes grouped under two headings—auth special interest groups (SIGs) and Node SIGs.This should help you easily find the updates that will have the greatest impact for your enterprise.
Members of the cybersecurity industry — including the Devo team — are gathering this week for the annual Black Hat USA conference in Las Vegas. Some will be present in person. Many others will participate virtually due to travel issues related to the pandemic. In either case, the latest edition of Black Hat, and its home city, have me thinking about cybersecurity and… gambling.
In part two of our series on writing checkers with CodeXM, we explore how to run your CodeXM checker with Coverity using a command line interface. In the last post, we discussed how to write a simple checker using CodeXM. But writing the checker is not our final purpose; our target is to use that checker on our own business code. In this post, we look at how to run your CodeXM checker with Coverity® using a command line interface.
Vulnerability scan reports are requested from a wide variety of people or entities for many different reasons. Historically a report meant a static snapshot of the scan data. Some company stakeholders may want an executive overview of the current vulnerabilities present in their environment. In contrast, others may want additional data points such as trending to reflect how well they have made progress in remediating previous vulnerability scans detected.
I previously talked about how to get started with a threat intelligence program, which is the cornerstone to any security operation. Such a program enables security teams to gain a deeper understanding of adversaries and their tactics, techniques and procedures (TTPs), in order to determine what is relevant to the organization and how to mitigate risk. Threat Intelligence Platforms (TIPs) allow you to gain better intelligence across the threat spectrum from known to unknown attacks and leverage this intelligence to optimize threat detection and response, preemptive blocking, and patch prioritization.
Zero Trust is not something you purchase. Zero Trust is a security strategy you build out using the working assumption that there are no safe network zones, no perimeters, no safe users, and no safe devices. The Spectra Alliance helps enable a Zero Trust model across the scope of six elements including applications, data, networks, infrastructure, identities, and devices. When you consider the large scope of digital transformation, including the four key phases for networking, security, applications, and data, the full journey starts to align itself as it intersects with Zero Trust elements.
Since our last update in January, there has been an unprecedented amount of activity in the data privacy world. And yes, we probably do say that every time! New laws have passed in Virginia and Colorado. The UK’s post-Brexit EU adequacy was confirmed. Plus of course, the EU’s significant changes to Standard Contractual Clauses and the reawakening of the debates over Identity Verification, especially in the context of social media. These industry landmarks and others, plus the way that data privacy has become – quite rightly – a fundamental part of topical conversations surrounding vaccinations and identity, all combine to require us to make the most substantial changes to the Periodic Table of Data Privacy yet.
In our previous blog on why you can’t compare SAST tools using only lists, test suites, and benchmarks, we explored the various tools and metrics commonly used today to assess and compare SAST testing tools. We also looked at a few reasons why those tools might produce inconsistent results and might not be at all reliable for the purpose of assessing a SAST testing tool. Instead, when assessing a SAST testing tool, there are 3 parameters you will want to consider.
I watched the Senate Judiciary Committee’s hearing about ransomware called “America Under Cyber Siege: Preventing and Responding to Ransomware Attacks” with mixed emotions. I am glad to see there are impressive, dedicated professionals like those who testified before the committee on the case, focusing on the areas where additional legislation could help prevent future attacks. I’m glad to see there is awareness, but if we're going to see real change we need to achieve a better collective understanding of the underlying problems behind the eye-catching ransomware headlines.
People make up an important part of an organization’s security posture. That’s because some employees have the rights necessary for accessing sensitive data as well as the privileges for viewing and/or editing critical systems. If those individuals have the right focus and training, they can play a crucial part in keeping those assets safe against digital attackers. But if they aren’t paying attention, they could do something that puts their employer at risk.
When exploringhttps://securityscorecard.com/admin/entries/blog/154640?draftId=2332&fresh=1# top network security breaches, many think of the obvious: banks or large consumer institutions. However, healthcare organizations are on the rise as a top target for hackers, with the number of data breaches rising 36% in the second half of 2020. As threat tactics become more sophisticated each day, it is important that providers stay proactive by implementing proper cybersecurity measures to maintain HIPAA compliance within their organization and protect patient data.
As insurance organizations look to attract and engage customers, the growing use of web applications has increased their cyber exposure and the risks of cyberattacks. In this benchmark study, we analyzed the attack surface of the top 10 insurers in Europe to highlight the common attack vectors and security weaknesses that could be exploited – from page creation method to vulnerable components – and our top tips for reducing web application security risks.
Technology, culture, and process all have to change to ensure safe software is delivered faster. It’s a lot to tackle. But you don’t have to do it alone. The Secure Developer, a podcast from Snyk’s founder Guy Podjarny, just hit 100 episodes of thought-provoking conversations with security experts at a wide cross-section of companies. From big enterprises like Nike, LinkedIn, Twitter, and United Healthcare, to niche players like Optimizely and Toast, Guy asks the questions and uncovers the insights that can help leaders and teams embrace security more smoothly.
More and more companies understand the benefits of cloud computing, which is making their migration to the cloud more rapid. Per IDG’s 2020 Cloud Computing Study, 81% of organizations said that they’ve migrated either one application or a portion of their infrastructure to the cloud. The reasons why a company would shift its services towards the cloud depend on its business priorities, of course. General reasons for migrating include 1) cost-savings, 2) reliability, 3) scalability, and 4) flexibility.
After more than 25 years, Java is still one of the most popular open source programming languages in the world. To provide more insights into how Java and the JVM ecosystem are used amongst the developer community, Snyk has launched the Java ecosystem report 2021.
There are many information security standards that UK businesses can work with to protect themselves from cyber related risks. If you’re looking for straightforward measures, which will provide a great starting point and demonstrate compliance in the industry, don’t fret! This article covers some of the most popular cyber security standards out there so it’s okay if your head is spinning at all this information overload right now – we have got you covered on everything from securing data such as passwords and encryption keys to backing up critical systems.
In the wake of the pandemic, airlines are fighting back against challenges from all directions this year. Many have banded together to protest government orders around banned routes, Covid testing and post-travel quarantine periods. International holiday-going in 2021 has become an unappealing prospect for many, due to the added expense and inconvenience imposed by Covid restrictions. As if conditions weren’t challenging enough for the aviation industry in 2021, there is another factor disrupting their ability to sell tickets: a huge uptick in bot traffic and business logic attacks.
Website security should be a concern for any business owner because attackers are becoming much more sophisticated and are always looking for ways to get into customer databases even without exploiting the victim directly. In this blog, we are sharing a website security checklist to help website owners improve their websites against the most common cyber attacks.
In this blog post, we outline past and present threats to the Olympic Games and the steps that organisations can take to reduce the risks. With more than 11,000 athletes and 206 countries and states taking part, the delayed Tokyo 2020 Olympic Games are currently being watched around the world. This level of visibility makes the Games a target for those seeking to cause politically-motivated harm, enrich themselves, boost their profile or undermine the host nation on an international stage.
Given the spate of recent ransomware attacks, the latest of which occurred shortly before Independence Day, this topic is likely at the top of mind for most organizations. Understanding the fundamentals of security, and the most common ways ransomware gets installed, is a must if a company hopes to truly lay the groundwork required to build and operationalize their security program.
Scammers target businesses with phishing emails all the time, pretending to be legitimate customers or vendors asking for payment. While any company can be vulnerable to this type of attack, small- to medium-size companies are particularly vulnerable because it is easier for a scammer to do a bit of research online and identify the right people to impersonate or send a phishing email to. A quick social media search or a visit to a corporate website can quickly identify key people such as the CEO, company directors, accounting staff, or office managers who may be able to facilitate a requested fraudulent payment.
The Kubernetes community created a feature in v1.10 called Pod Security Policy (PSP) to control the security-related fields for pods defined in your Kubernetes cluster. Now that PSP is being deprecated in Kubernetes v1.21, what should you do to secure your Kubernetes cluster? In this blog, we’ll learn a bit about PSP, explore why it’s being deprecated and how Open Policy Agent (OPA) can ease the migration from PSP.
MongoDB is one of the most popular open-source databases. Unfortunately, this also means ubiquity of misconfigured and unsecured MongoDB deployments out in the wild. Just in recent years, we’ve seen several hacks involving thousands of MongoDB databases left exposed online without any protection, making them ripe for the hacker’s picking. It doesn’t have to be this way, though. There are many steps you can take to keep your MongoDB data safe — from protecting the network perimeter to using strong transport security to taking advantage of MongoDB’s advanced user management and role-based access control (RBAC) system.
Application security remains a top concern for organizations, making the need for skilled cybersecurity professionals as urgent as ever. Nearly half of security practitioners in high-performing enterprises who participated in a recent Ponemon Institute research report about reducing enterprise security risks stated that hacks to insecure applications are their organization’s biggest concern.