Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

How Can I Build a Cost-efficient SOC?

IT security breaches have become a norm of the day at innumerable organizations around the world. Most of the attacks indicate that the enterprises should highly focus on their mitigation capabilities, incident detection, and investigation processes. Preventing highly sophisticated cyber attacks is a daunting task unless companies have the capability to detect and then respond quickly.

Ransomware Attacks: All you need to know

In 2017, ransomware attacks clearly dominated the cybersecurity landscape. WannaCry, Petya, Not Petya, Adylkuzz, Bad Rabbit, Cerber, etc. are just a few names that did the rounds in the last year. Lucrative payments is one of the most prominent reasons which has lured in many attackers to launch multiple ransomware campaigns in the last couple of decades. Though we are yet to see a major ransomware attack this year, activities of cyberspace are unpredictable.

The Growth of AI and Employee Monitoring In the Workplace

Recently the Economist published two articles that discussed the increasing use of AI and employee monitoring in the workplace. Veriato is pleased that we were referenced in both of these articles. We feel they did a good job of presenting a balanced view of the benefits both AI and employee monitoring offer, as well as the potential downsides if they are not implemented and used wisely.

Rethinking File Servers for the 21st Century

The amount of private content being collected, shared, and stored is growing at an alarming rate. It’s no surprise that the means to classify, share and control what matters is fast-becoming business’ biggest challenge. The traditional method of stacking file servers doesn’t scale or support the collaboration necessary to stay competitive.

3 Emerging Innovations in Technology that Will Impact Cyber Security

The war between security experts charged with the responsibility of protecting information and cyber-criminals who threaten to compromise the integrity of data for different entities has become a cat and mouse game. For instance, as soon as white hats counter one form of malicious behavior using encryption tools, there is the almost immediate development of yet another malevolent form of threat for information systems.

Internet of Things security practices for your business

Wearables, smart speakers, remote security systems, connected cars, inventory trackers, smart headphones: these are just a handful of the connected devices in modern workplaces. The Internet of Things (IoT), or internet-enabled devices that collect and act upon data, is becoming more popular with ever-increasing applications. Far beyond a smart coffee pot that automatically gets the brew going to start the workday, the Internet of Things is changing business security and vulnerability in a big way.