Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Third-Party Breaches: Why You Should be Prioritizing Supply Chain Cyber Risk Today

Look at any collection of top 10 organizational security concerns from recent years, and “third-party breaches” are consistently high on the list. These attacks have caused financial and reputational damage to every sector, from banks to healthcare systems to retail to governments. And the problem is growing. Recent statistics highlight just how severe the issue has become.

5 Critical Security Risks Facing COBOL Mainframes

COBOL remains deeply embedded in the infrastructure of global enterprises, powering critical systems in banking, insurance, government, and beyond. While its stability and processing efficiency are unmatched, legacy environments running COBOL face a growing challenge: Security. As cyber threats evolve and legacy systems continue to age, COBOL-based mainframes present attractive targets due to their outdated configurations, minimal security oversight, and lack of modern defenses.

Navigating the Noise: Separating Security Reality from Hype

In the cybersecurity landscape, sensational headlines and alarming vulnerability disclosures are commonplace. Recent events have been a whirlwind, with claims of massive data breaches and widespread vulnerabilities affecting critical infrastructure. From the overstated impact of Next.js middleware vulnerabilities to the exaggerated reach of Nginx ingress issues, it's clear that the cybersecurity community needs a reality check.

When "Secure by Design" Isn't Enough: A Blind Spot in Power Platform Security Access Controls

Security Groups play a pivotal role in tenant governance across platforms like Entra, Power Platform, and SharePoint. They allow administrators to control access, enforce identity-aware security, and prevent unauthorized interactions. However, we’ve identified a security group bypass risk: Application Users (App Users) - Service Principal identities from Entra - can slip past Security Group restrictions, creating misaligned identity assumptions and enabling unauthorized data access.

Are Your VPNs and NACs Secretly Sabotaging Your Security?

For many, the answer still involves legacy VPNs and Network Access Control (NAC), familiar tools from a different era. But what if those trusted systems aren’t protecting you anymore, and are instead becoming some of your biggest liabilities? To explore this shift, Netskope partnered with Cybersecurity Insiders, a leading research platform for CISOs and cybersecurity professionals, to dig into the real risks of relying on outdated access solutions.

How we fixed a session race condition at Vanta

Vanta provides audit firms and managed service providers (MSPs) with a dedicated console that allows them to oversee their clients and deliver audit and management services effectively. Partners work with their customers within their Vanta instances, conducting audits or helping them set up and manage their security and compliance program.

Exposure Management vs. Vulnerability Management: Key Differences and Why They Matter

Vulnerability management has hit a wall. Exposure management is how forward-looking teams break through it. According to Gartner, by 2026, organizations that adopt a continuous exposure management approach to guide security investments will be three times less likely to experience a breach. a more advanced and iterative approach to vulnerability management. Despite growing interest, confusion remains around what exposure management is and how it differs from vulnerability management.