Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Navigating the Supply Chain Security Maze with SBOMs

Security Magazine reported more than 2,200 daily cyberattacks, which translates to roughly one cyberattack occurring every 39 seconds! As these stakes in cybersecurity continue to reach higher and higher levels, it becomes even more crucial to emphasize securing the very bedrock of elements upon which our digital existence is built.

Get the AT&T Cybersecurity Insights Report: Focus on Retail

We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights Report: Focus on Retail. The report examines the edge ecosystem, surveying retail IT leaders from around the world, and provides benchmarks for assessing your edge computing plans. This is the 12th edition of our vendor-neutral and forward-looking report. Last year’s focus on retail report documented how we secure the data, applications, and endpoints that rely on edge computing (get the 2022 report).

Elastic Global Threat Report 2023: Top cybersecurity forecasts and recommendations

We are excited to announce the release of the 2023 Elastic Global Threat Report, a comprehensive analysis of over one billion data points. The report provides insights into the methods, techniques, and trends of threat actors from the perspective of defenders, helping customers, partners, and security teams to prioritize and improve their security posture. The observations in the report are based on anonymized Elastic telemetry and public and third-party data submitted voluntarily.

Securing symmetric encryption algorithms in Java

In our connected world, securing digital data has become an utmost priority. With the wide spread of Java applications in various sectors, from banking to healthcare, we must emphasize the importance of encryption. Encryption is converting readable data or plaintext into unreadable data or ciphertext, ensuring that even if encrypted data is intercepted, it remains inaccessible to unauthorized individuals.

Unlocking the Power of Knowledge for Enhanced Security Posture

In today’s digital landscape, knowledge is power, and this is especially true when it comes to understanding your security posture and system operations. Without a deep understanding of your security systems’ performance, your organisation could be vulnerable to cyber threats. Let’s delve into a few key areas where knowledge can empower you in enhancing security posture.

A better audit experience for you - and your auditor, too

Today, we're excited to announce a collection of new capabilities that improves the audit experience for Vanta customers and their auditors. ‍ From before the audit even begins through audit closure — and every step along the way — Vanta has made improvements to streamline processes and increase opportunities for collaboration. Some capabilities are currently in beta, and we’ll continue to release new capabilities in the coming weeks and months. ‍

Secure Software Supply Chain by Signing Git Commits With Keeper

The modern threat landscape is constantly changing and the software supply chain has become a common target for cybercriminals. Cyberthreats have become a headache for overworked developers and DevOps teams as they face tight deadlines, limited staffing resources and the added burden of ensuring that their code does only what it is intended to do and is free of bugs and malware.

Evolution of Cybersecurity: From Passwords to On-Demand CRQ

In merely a few decades, technological pioneers developed an unprecedented ability for society to access and store data in immeasurable quantities. This newfound power transformed many aspects of the physical world into a digital one, taking everyday activities such as banking, gaming, shopping, and socializing online.