Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Do You Use ChatGPT at Work? These are the 4 Kinds of Hacks You Need to Know About.

From ChatGPT to DALL-E to Grammarly, there are countless ways to leverage generative AI (GenAI) to simplify everyday life. Whether you’re looking to cut down on busywork, create stunning visual content, or compose impeccable emails, GenAI’s got you covered—however, it’s vital to keep a close eye on your sensitive data at all times.

Q2 Privacy Update: AI Takes Center Stage, plus Six New US State Laws

The past three months witnessed several notable changes impacting privacy obligations for businesses. Coming into the second quarter of 2023, the privacy space was poised for action. In the US, state lawmakers worked to push through comprehensive privacy legislation on an unprecedented scale, we saw a major focus on children's data and health data as areas of concern, and AI regulation took center stage as we examined the intersection of data privacy and AI growth.

The CISO Report - The Culture Club

According to the Cyber Security Skills in the UK Labour Market 2023 report released by the UK government, 50% of UK businesses face a fundamental cyber security skills gap, while 33% grapple with an advanced skills gap. This is just one of the challenges that the Chief Information Security Officer (CISO) must face. While these figures remain similar to 2022 and 2021, it's evident that there's still work to be done to bridge the expertise divide.

Overcoming US Regulatory Compliance Challenges with Borderless Data

In today’s age of rapidly increasing data collection, data privacy laws are becoming more prevalent than ever. The EU’s General Data Protection Regulation (GDPR) is considered the worldwide benchmark of data privacy law. While many countries have followed similar regulations, the United States does not have a GDPR equivalent. Instead of national standards and regulations, individual states pass their own privacy laws.

Biometric Authentications and Their Security Advantages

The ever-changing cybersecurity environment is defined by a constantly evolving range of threats coupled with a need for more available talent in the industry. This situation creates a gap in organizations adopting cybersecurity products and services. As such, a $2 trillion opportunity is waiting to be explored. The budgets of many chief information security officers (CISOs) are still lacking. This results in the under-penetration of cybersecurity products and services.

How Vanta uses Okta for identity and access management

In this series, you’ll hear directly from Vanta’s own Security, Enterprise Engineering, and Privacy, Risk, & Compliance Teams to learn about the team’s approach to keeping Vanta secure. We’ll also share some guidance for teams of all sizes — whether you’re just getting started or looking to uplevel your operations.

Maximize Productivity, Performance, and Security: Unleashing the Power of Netskope and Zoom

Zoom is firmly a part of everyday work. The modern workspace is no longer a corporate office—it’s anywhere an employee accesses corporate data and applications. With the widespread adoption of hybrid work, there has been a hard shift towards communication platforms like Zoom that allow you to connect, share ideas, and get projects done together in real time, regardless of your physical location.

Can machines dream of secure code? From AI hallucinations to software vulnerabilities

As GenerativeAI expands its reach, the impact of software development is not left behind. Generative models — particularly Language Models (LMs), such as GPT-3, and those falling under the umbrella of Large Language Models (LLMs) — are increasingly adept at creating human-like text. This includes writing code.

The Blurred Lines Between Payment Fraud and Cybercrime: Implementing Robust Security Solutions to Stay Safe Online

Once upon a time, there was a small business owner named Alice, who fought to keep her retail establishment afloat amid the stormy seas of a global pandemic. Like many other merchants, she embraced the digital revolution and moved her store online. This allowed her to reach more customers and keep her business buoyant. Her store, Alice’s Wonderland, offered a vibrant range of local handicrafts that started garnering attention on social media. It was a tale of small business success.