Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI and Compliance: Preventing Personally Identifiable Information Leakage

AI and Compliance: Preventing PII Information Leakage In this video, A10 Networks' security leaders, Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar, delve into the growing security risks associated with the adoption of conversational AI bots and Large Language Models (LLMs), particularly in sensitive fields such as healthcare. Diptanshu Purwar highlights several key concerns.

Intergrating Secure Lifecycle into DevOps for PCI DSS Compliance

SLC refers to the entire process of developing and maintaining software, encompassing various stages like planning, design, development, testing, deployment, and maintenance. The average cost of a data breach in the financial sector is approximately $5.85 million. Incorporating security into DevOps can significantly reduce these costs by preventing breaches early. Around 73% of organizations have adopted DevSecOps practices to embed security into their DevOps pipelines.

How NDIS Software Is Revolutionising Disability Support Services in Australia

In recent years, the disability support sector in Australia has undergone a remarkable digital transformation. With the National Disability Insurance Scheme (NDIS) at the core of service delivery, the integration of NDIS software has become a game-changer for providers and participants alike. From streamlining admin tasks to enhancing client care, NDIS software is revolutionising how disability support services operate across the country.

Vanta Partners with XBOW to Deliver Autonomous Penetration Testing to Startups

New in-app integration delivers enterprise-grade security testing at startup speed and scale. Showcasing new innovation across the AI-powered Vanta platform at booth #5424 and XBOW's autonomous pen testing at booth #3257 at Black Hat 2025.

10 Ways Cybersecurity Teams Can Stay Ahead of Emerging Threats

Cybersecurity threats are always changing. Hackers are constantly finding new ways to break into systems. As technology grows, so do the risks. A single weak spot can lead to serious damage. To stay safe, security teams must stay ahead, not just keep up. The following strategies offer practical ways to build a strong cybersecurity strategy and prepare for what lies ahead.

Evolving Security Frameworks: From Compliance Checklists to Intelligence Engines

For years, security frameworks have served as essential tools for aligning cybersecurity practices, but they’ve also come with limitations. Designed primarily for compliance, many frameworks are rigid by nature, sometimes to the extent of being a checklist, making them ill-suited for today’s dynamic risk environments. But the threat landscape has evolved, and so too must our approach.

How to translate CVSS scores into financial impact: A CISO's risk quantification guide

In this article Chief Information Security Officers (CISOs) face the daunting task of balancing technical cybersecurity risks with the financial realities of their organization. One critical component in this balancing act is the use of vulnerability scoring systems, in particular, the CVSS score. This article provides a detailed guide on how to translate CVSS scores into tangible financial impact estimates using proven methods of risk quantification.