Tag: Snyk
NIST’s Vuln Database Downshifts, Prompting Questions About Its Future
Since 2005, the National Vulnerability Database (NVD) has been posting details about the hundreds of daily common vulnerabilities and exposures (CVEs) discovered by security researchers...
Breaking News
CISO Planning for 2024 May Struggle When It Comes to AI
Just about every CISO knows how this scenario goes: Called in to brief the board, they are asked, "So what are we doing about...
Black Hat Europe 2023 Closes on Record-Breaking Event in London
PRESS RELEASELONDON, Dec. 20, 2023 — Black Hat, the cybersecurity industry’s most established and in-depth security event series, today announced the successful completion of...
SecTor 2023: Full Schedule Programming for Toronto Event
PRESS RELEASETORONTO -- (BUSINESS WIRE) -- SecTor, Canada’s largest cybersecurity conference, today announced its full schedule programming for SecTor 2023. Taking place in Toronto...
Black Hat USA 2023 Closes on Record-Breaking Event in Las Vega
SAN FRANCISCO -- (BUSINESS WIRE) -- Black Hat, the producer of the cybersecurity industry’s most established and in-depth security events, today announced the successful...
Despite Post-Log4J Security Gains, Developers Can Still Improve
Developers are increasingly adopting security testing as part of the development pipeline, but companies still have room for improvement, with a minority of companies...
Global Hacking Competition Addresses Critical Increase in Cybersecurity Threats for Businesses
London, Monday 3rd July, 2023 — Hack The Box, a disruptive cybersecurity upskilling, certification and talent assessment platform, has announced its upcoming global Capture The...
Red Hat Tackles Software Supply Chain Security
In a bid to help developers securely build and deploy applications that rely on open source components, Red Hat unveiled the secure-by-design playbook the...
OpenSSF Adds Software Supply Chain Tracks to SLSA Framework
The Open Source Security Foundation (OpenSSF) released v1.0 of Supply-chain Levels for Software Artifacts (SLSA) with specific provisions for the software supply chain.Modern application...
Build custom code libraries for your Amazon SageMaker Data Wrangler Flows using AWS Code Commit
As organizations grow in size and scale, the complexities of running workloads increase, and the need to develop and operationalize processes and workflows becomes...
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities
At the recent CloudNativeSecurityCon in Seattle, 800 DevSecOps practitioners gathered to address a myriad of software supply chain security issues, including the security of...
Top Takeaways From CloudNativeSecurityCon 2023
Cloud-native technology is growing in importance, and the Cloud Native Computing Foundation (CNCF), part of the Linux Foundation, is a key organization driving collaboration...
Snyk Gets Nod of Approval With ServiceNow Strategic Investment
Developers, security professionals, and investors all find something to like about Snyk and its developer security platform, which helps organizations mitigate their risk of...