Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Splunk Ranked Number 1 in the 2024 Gartner Critical Capabilities for Security Information and Event Management

In addition to Splunk’s recognition as a 10-time Leader in the 2024 Gartner Magic Quadrant for Security Information and Event Management (SIEM), we are extremely proud to announce that Splunk was ranked as the #1 SIEM solution in all three Use Cases in the 2024 Gartner Critical Capabilities for Security Information and Event Management report.

AI Regulations and Governance Monthly AI Update

In an era of unprecedented advancements in AI, the National Institute of Standards and Technology (NIST) has released its "strategic vision for AI," focusing on three primary goals: advancing the science of AI safety, demonstrating and disseminating AI safety practices, and supporting institutions and communities in AI safety coordination.

Risks for Polyfill.io Users

Earlier this year, a Chinese company named Funnull acquired the polyfillio. Due to this acquisition, this code was used to redirect mobile visitors to scam sites. Over 100,000 websites using the previously popular Polyfill JS open-source project are vulnerable to attacks that redirect traffic to sports betting and pornography sites.

Inbox on Lockdown: Stop Email Leaks Before They Happen

Ever hit send on an email and immediately felt that sinking feeling? Maybe it was an attachment containing sensitive data that was misplaced, or that clever phishing email that convinced a colleague to cough up login credentials. These are cases that clearly explain the critical need for Email Data Loss Prevention (DLP).

Data Anonymization Techniques for Secure LLM Utilization

Data anonymization is transforming data to prevent the identification of individuals while conserving the data's utility. This technique is crucial for protecting sensitive information, securing compliance with privacy regulations, and upholding user trust. In the context of LLMs, anonymization is essential to protect the vast amounts of personal data these models often process, ensuring they can be utilized without compromising individual privacy.