Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Transforming defence with Elastic AI and data capabilities

What a time it is for data and the UK Ministry of Defence (MoD), with large language models (LLMs) and artificial intelligence (AI) innovation accelerating at unprecedented speed. How quickly can the MoD take operational advantage of these advancements? Now is the time to unleash the power of data and transform how the MoD approaches cybersecurity to outpace adversaries, gain multi-domain operational efficiency, and of course, attain rapid decision-making superiority.

Atrium Health at Wake Forest Suffered a Major Breach Losing Patient Data

Atrium Health is a major health services provider for primary care and specialty care at Wake Forest in North Carolina. The service provides care to thousands of individuals and manages data for all those people. Some of that data was recently lost to a data breach that's left patients, doctors, and staff members uncertain and concerned. The breach occurred quickly and created some issues that anyone relying on Atrium Health should be aware of.

Data Scanning Explained: What Scanning Data Can Do For You

From 2010 to 2020, the amount of data being generated, stored and shared grew by nearly 5000%. During the COVID-19 pandemic, data breaches also spiked in the US. Makes sense, then, that protecting this valuable asset has become a top priority for businesses. Enter data scanning — a powerful process that helps organizations identify and safeguard sensitive data. In this blog post, we will delve into the concept of data scanning, its importance and the key benefits it brings to the table.

API Security Testing: Importance, Methods, and Top Tools for Testing APIs

APIs play a significant role in seamlessly integrating applications and services. However, APIs with security vulnerabilities could open doors to cyber attackers and compromise sensitive and confidential data and systems. Therefore, it is imperative to incorporate API security testing into the API development process as early as possible.

Our approach to threat modeling

In this series, you’ll hear directly from Vanta’s Security, Enterprise Engineering, and Privacy, Risk, & Compliance Teams to learn about the team’s approach to keeping Vanta — and most importantly, our customers — secure. ‍ The following post comes from our Security Team and explains our approach to threat modeling. ‍ ‍

Stop Today's Emerging Endpoint Risks: Announcing Tanium SBOM for Comply, Expanded ARM Support, and Risk & Compliance Updates

Our most recent product and feature release further secures software supply chains, extends Tanium’s single view of endpoint data to additional ARM-powered devices, and expands the capabilities of our Risk & Compliance solution.

How we think about Zero Trust Performance

Cloudflare has done several deep dives into Zero Trust performance in 2023 alone: one in January, one in March, and one for Speed Week. In each of them, we outline a series of tests we perform and then show that we’re the fastest. While some may think that this is a marketing stunt, it’s not: the tests we devised aren’t necessarily built to make us look the best, our network makes us look the best when we run the tests.

Extremely Persistent Threat Group Demonstrates a Strong Understanding of the Modern Incident Response Frameworks

A threat actor tracked as “Muddled Libra” is using the 0ktapus phishing kit to gain initial access to organizations in the software automation, business process outsourcing, telecommunications, and technology industries, according to researchers at Palo Alto Networks’ Unit 42.

Gartner SOC Model Guide: Find the Security Operations Center Model That Best Fits Your Needs

Strong, resilient security operations require the proper melding of people, technology, and processes to achieve the goal of reducing the likelihood and impact of cyber threats. The right security operations center (SOC) will strengthen the overall security resiliency of an organization. The wrong one will tax your team — leading to mistakes, breaches, and losses.

Research with Snyk and Redhunt Labs: Scanning the top 1000 orgs on GitHub

Open source code is a vital aspect of modern development. It allows developers to increase their application’s functionality, while reducing overall development time. However, the system isn’t perfect. The nature of third party software and it’s dependencies often creates opportunity for security vulnerabilities to lurk in libraries and downloads.