Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Get the AT&T Cybersecurity Insights Report: Focus on Retail

We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights Report: Focus on Retail. The report examines the edge ecosystem, surveying retail IT leaders from around the world, and provides benchmarks for assessing your edge computing plans. This is the 12th edition of our vendor-neutral and forward-looking report. Last year’s focus on retail report documented how we secure the data, applications, and endpoints that rely on edge computing (get the 2022 report).

Elastic Global Threat Report 2023: Top cybersecurity forecasts and recommendations

We are excited to announce the release of the 2023 Elastic Global Threat Report, a comprehensive analysis of over one billion data points. The report provides insights into the methods, techniques, and trends of threat actors from the perspective of defenders, helping customers, partners, and security teams to prioritize and improve their security posture. The observations in the report are based on anonymized Elastic telemetry and public and third-party data submitted voluntarily.

Securing symmetric encryption algorithms in Java

In our connected world, securing digital data has become an utmost priority. With the wide spread of Java applications in various sectors, from banking to healthcare, we must emphasize the importance of encryption. Encryption is converting readable data or plaintext into unreadable data or ciphertext, ensuring that even if encrypted data is intercepted, it remains inaccessible to unauthorized individuals.

Unlocking the Power of Knowledge for Enhanced Security Posture

In today’s digital landscape, knowledge is power, and this is especially true when it comes to understanding your security posture and system operations. Without a deep understanding of your security systems’ performance, your organisation could be vulnerable to cyber threats. Let’s delve into a few key areas where knowledge can empower you in enhancing security posture.

A better audit experience for you - and your auditor, too

Today, we're excited to announce a collection of new capabilities that improves the audit experience for Vanta customers and their auditors. ‍ From before the audit even begins through audit closure — and every step along the way — Vanta has made improvements to streamline processes and increase opportunities for collaboration. Some capabilities are currently in beta, and we’ll continue to release new capabilities in the coming weeks and months. ‍

Secure Software Supply Chain by Signing Git Commits With Keeper

The modern threat landscape is constantly changing and the software supply chain has become a common target for cybercriminals. Cyberthreats have become a headache for overworked developers and DevOps teams as they face tight deadlines, limited staffing resources and the added burden of ensuring that their code does only what it is intended to do and is free of bugs and malware.

Evolution of Cybersecurity: From Passwords to On-Demand CRQ

In merely a few decades, technological pioneers developed an unprecedented ability for society to access and store data in immeasurable quantities. This newfound power transformed many aspects of the physical world into a digital one, taking everyday activities such as banking, gaming, shopping, and socializing online.

The Peril of Child Identity Theft and How to Mitigate It

We often hear of how we need to protect ourselves from online scams. Criminals seek our personal information in order to use it for multiple nefarious purposes. However, there is a population who, while not having a broad online presence, are equally vulnerable to identity theft. Children are particularly vulnerable to identity theft, as they often have clean credit histories and their personal information is not monitored as closely as adults.