Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Log4j/Log4Shell One Year Later: Endemic Vulnerability Indeed

On December 9, 2021, Apache upended the cybersecurity industry by publishing a zero-day vulnerability (CVE-2021-44228) for its ubiquitous Log4j logging utility. Dubbed Log4Shell, the remote code execution flaw (CVSS score:10) allows an attacker to take control of a connected device and run malicious code, access sensitive data or alter its configuration. Because Logj4 is free and easy-to-use, it’s embedded (often deeply) in Java applications used by IT and OT platforms worldwide.

Defragging database security in a fragmented cloud world

Security can often be distilled down to protecting data. And with microservice-driven applications, the approach to cloud database security has evolved quite dramatically. Beyond just securing data in the cloud, it’s now also difficult to know where the data resides, where the data is flowing, and how this data should be classified.

Vanta is the #1 Leader in G2's Winter 2023 Grid Reports for Security Compliance

We are excited to share that Vanta has been named the #1 Leader in G2’s Winter 2023 Grid® Report for Security Compliance. We’ve also been recognized as the #1 Leader in G2’s Cloud Compliance category for the sixth consecutive season, and retained leadership in Vendor Management, Vendor Security and Privacy Assessment, Cloud Security, and IT Asset Management for multiple seasons. Vanta is the leader in a total of 19 G2 categories. ‍ ‍

2022 Cybersecurity Census Report Unveils Investment Urgency for UK's Education Sector

One in 10 UK educational institutions are subject to more than 250 attacks each year. Just one in five consider their organisation 'very well prepared' in the face of cyberattacks. Almost half (48%) believe they are lacking in either skills, solutions, or both, to deal with cyberattacks.
Featured Post

JUMPSEC works on a prototype lightweight anomaly detection system

Deploying machine learning models in the cyber security industry is complicated - especially with budget and technology limitations. Especially when it comes to anomaly detection, there's been much debate over privacy, balance, budget, robustness, cloud security and reliable implementation. For cyber security companies using machine learning technologies, ensuring clients' safety with trustworthy artificial intelligence (AI) must always be the primary objective.

Corelight launches the Entity Collection

Corelight Labs, our amazing research team, has been hard at work on another content collection which we are excited to introduce: the Corelight Entity Collection. Corelight evidence is powerful and comprehensive. So comprehensive, in fact, that it can sometimes be hard to know where to start. Providing customers faster ways to find meaningful context in our data was the driving force behind the creation of the Entity Collection.

A Complete Guide on Comodo EV Code Signing Certificate

EV Code Signing Certificate resides at the top of the digital certificate hierarchy due to its enormous security functionalities. Organizations active for a minimum of three years can only obtain it by undergoing a strict validation process. In addition, Certificate Authorities perform a rigorous verification of all documents before issuing the EV Code Signing Certificate.

How Did Someone Guess My Password?

Finding out that someone has guessed your password can be a scary feeling. Passwords protect your important data, so having someone guess it is a major threat to your security. There are several ways someone could have guessed your password including having bad password habits and easy-to-guess security questions. Read on to learn more about password guessing and the steps you can take to avoid it from happening to your accounts.