Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Top 5 SaaS misconfigurations to avoid and why

Cloud storage services and SaaS apps like Google Drive and Microsoft OneDrive provide convenient, scalable solutions for managing documents, photos, and more—making them indispensable for modern work and personal life. However, misconfigured settings and permissions can lead to serious security breaches, noncompliance, and even the loss of customer trust. Let’s explore the 5 most common misconfiguration issues with real-world examples.

Vanta Trust Center, now enhanced with Questionnaire Automation and Vanta AI

As the number and severity of third-party breaches continues to rise, companies are scrutinizing more closely not just how they handle data, but how their vendors do as well. For security leaders, this means more security reviews are coming across their desk everyday. ‍ Limited resources and legacy processes make it hard for security teams to keep up with the pace of business.

17 Ways To Prevent Insider Threats: Steps, Tips & Tools

When you think of cybersecurity, your mind likely goes to external threat actors — malware, ransomware, spearphishing attacks, and other malicious activity. However, it’s crucial to note that 60% of data breaches are caused by insider threats, and a staggering 74% of organizations are at least moderately vulnerable to them. It’s not everybody else your organization needs to worry about; it’s your own people.

Hacking Cybersecurity Training: Escape Rooms & Entrepreneurial Thinking with Amy Stokes-Waters

Join us on this week's edition of the Razorwire podcast where host Jim chats with Amy Stokes-Waters, CEO of The Cyber Escape Room Co. Amy, transitioning from a non-traditional background into cybersecurity, shares her entrepreneurial journey and innovative approach to security awareness training through engaging escape room experiences.

Insider Threats: Shocking Offer Outside Tesla Reveals Cybersecurity Risks

Amy Stokes-Waters discusses a real-world attempt to bribe a Tesla employee for secure access, highlighting the overlooked dangers of insider threats in cybersecurity. Discover the risks businesses face from both internal and outsourced hacking efforts, and why robust security measures are crucial. Tune in for more insights into the hidden world of corporate espionage and its impact on information security.

3 observability best practices for improved security in cloud-native applications

Observability, especially in the context of cloud-native applications, is important for several reasons. First and foremost is security. By design, cloud-native applications rely on multiple, dynamic, distributed, and highly ephemeral components or microservices, with each microservice operating and scaling independently to deliver the application functionality.

The Evolving Landscape of LLM Security Threats: Staying Ahead of the Curve

The rapid advancements in large language models (LLMs) have revolutionized how we interact with technology, powering various applications for different use cases. As the adoption of LLM-powered solutions continues to grow, so does the emergence of new and evolving security threats that aim to exploit these robust AI systems.