Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Rights of a Data Principal Under the DPDP Act

With the advent of the Digital Personal Data Protection Act (DPDP Act) in 2023, India has taken a significant step towards safeguarding the rights of individuals, termed as ‘Data Principals’, over their personal data. This blog post aims to shed light on the rights and protections offered to Data Principals under the DPDP Act, a landmark legislation that is reshaping the landscape of data privacy in India.

How to Comply With the Principles of the DPDP?

Businesses with Indian customers or those accessible to Indian citizens, take note! The Digital Personal Data Protection Act (DPDP) has been passed in India. This new law, approved by the president on August 11, 2023, dictates how organizations handle personal data. The DPDP Act is not yet enforceable as the Data Protection Board of India is still being established.

Remote Work Cybersecurity: 9 Essential Data Protection Strategies for Online Security

The rise of remote work, which currently sees 40% of US employees working remotely at least one day a week, has been fueled by technological advancements and recent global events. But with this shift comes a silent, lurking challenge: cybersecurity. The vast, interconnected web of remote workspaces amplifies the potential for cyber attacks. Businesses must protect their data to maintain the trust of customers, preserve their reputation, and ensure uninterrupted business operations.

Introducing expanded Role-Based Access Control

Today we’re thrilled to announce that Vanta’s Role-Based Access Control (RBAC) functionality has gotten even stronger with new capabilities, including: ‍ ‍ These expanded RBAC capabilities are now generally available and demonstrate Vanta’s continued commitment to supporting the needs of larger, more advanced organizations through additional customization and flexibility across our platform. ‍

Sidecar Containers in Kubernetes: A Personal Journey

I had always wanted to use sidecars with Istio or Splunk forwarder in production, but as a Kubernetes maintainer, I knew there was no reliable way of telling Kubernetes to ensure sidecar containers were kept running before and after the main application. In this post I will share the twists and turns of my adventure in addressing this long-standing Kubernetes challenge.

How Netskope's Security Competency and AWS Integrations Help Address the Shared Responsibility Model

It’s no secret that Amazon Web Services (AWS) continues to grow by leaps and bounds as organizations modernize their IT infrastructure by migrating apps and workloads to the cloud. And due to the AWS shared responsibility model of cloud security, a deep and broad ecosystem of security vendors has also grown up alongside AWS.

TrustCloud Product Updates: September 2023

Our team has been hard at work creating updates and new features just for you, see what we’ve been up to over the last month. NEW: Prove the ROI of your security and privacy investments with TrustCloud Business Intelligence (BI) TrustCloud Business Intelligence is here! Now, you can see and share key results from across your compliance, risk management, and sales acceleration programs to showcase ROI, prove value, plan your resources, and easily align with stakeholders.

What To Do if You Get Hacked

The first thing to do after realizing you’ve been hacked is to secure your accounts by immediately changing all of your passwords and enabling Multi-Factor Authentication (MFA). You should also scan your device with antivirus software, secure your home WiFi network and reset your device. Read on to learn ten steps you should take after discovering you’ve been hacked and the telltale signs that you’ve been hacked.

How to execute an Azure Cloud purple team exercise

For folks who are responsible for threat detection of any kind for their organizations, the cloud can often be a difficult area to approach. At the time of writing, Amazon Web Services contains over two hundred services, while the Azure cloud offers six hundred. Each of these services can generate unique telemetry and each surface can present defenders with a unique attack path to handle. Adding to this complexity is the diversity of cloud workload configurations, as well as varying architecture models.

BMO Bank Loses Customer Data in Recent Data Breach Attack

BMO Bank is the 8th largest bank in the United States, employing over 12,000 individuals. The bank manages more than $3 Billion in annual reserves and works with a huge number of customers as it has over 1,000 physical locations across the country. BMO Bank is based in Chicago, Illinois, but has locations throughout the country. If you bank with BMO, your data may be at risk, because the organization was recently hacked and lost a significant amount of customer data.