Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Compliance Plus Library Reaches 800 Pieces of Content

It seems like only yesterday that we launched the Compliance Plus training library as a result of customers asking us to address their needs beyond security awareness training. The team and I were just looking at our first few months where we had just over 20,000 customer completions in June of 2021. We have since had millions of users complete our content and the library has grown from 115 pieces of content at launch to over 800 pieces of content.

Operationalize Data Security Automation with Cyera and Torq

Data is the critical foundation for all organizations, powering innovation, decisions, and growth. It’s also the fastest-growing attack surface, with sensitive information scattered across clouds, on-premise servers, and SaaS platforms. Cyera, the leader in modern data security, provides rich visibility into sensitive data down to its DNA level, providing vital context, identifying data risks and vulnerabilities, and delivering SOC teams a clear map of their data attack surface.

AI's Content Gold Rush: Who's Getting Paid, Who's Getting Scraped, and How Businesses Can Turn Content into Revenue

The AI boom is creating a new content economy – one where savvy content owners are striking multi-million-dollar licensing deals, while others are being automatically scraped by bots to train AI models for free. It’s impossible not to have noticed the biggest names in AI, including OpenAI, Google, Anthropic, Perplexity and more, at the center of an argument about ethical content scraping.

Enterprise Network Detection and Response Best Practices: 10 Tips for 2025

The cybersecurity landscape evolves rapidly. Threat actors develop sophisticated methods to breach defenses. Network Detection and Response (NDR) has emerged as a critical component in modern security solutions, identifying and mitigating threats traditional defenses miss.

Top 7 Account Takeover Solutions

Due to compromised accounts, financial institutions lose billions annually in unauthorized transactions and account-related fraud. Airlines suffer millions in fraudulent ticket purchases, and retailers face widespread loyalty fraud and resold gift cards. Automated, bot-driven takeovers further amplify the issue, driving costly credential-stuffing attacks that inflate operational costs and burn through budgets. The list goes on, and the problem is only getting worse.

CloudCasa Feature Update March 2025 - File Level Restore

Spring has just begun at most of Catalogic’s locations around the world, and outside plants are just beginning to sprout. But the CloudCasa team has been busy through the winter growing a bumper crop of new features and, to stretch the metaphor maybe a bit too much, now we’re ready to harvest them! We think you’ll be impressed with the new additions to CloudCasa in this release.

Expanding Access to Solana: Bringing More Volume On-Chain with Native Integrations

The institutional adoption of Solana is accelerating at an unprecedented pace, driven by its unmatched speed, efficiency, and scalability.. Its growing adoption by financial institutions and Web3 developers highlights its efficiency in real-time payments and tokenization. However, challenges remain in securely managing transactions, gas fees, and token operations.

What's new in Riscosity: March 2025

Riscosity has made it even easier to prioritize issues where data types are being shared by your Applications with 3rd party vendors by adding Confidence Scores to those data types. Users can focus in on the issues with data types that Riscosity had the highest confidence in determining without worrying about false positives.

Reduce costs and enhance security with cross-region Datadog connectivity using AWS PrivateLink

Modern cloud architectures are increasingly distributed, with applications and services spanning multiple regions to improve availability, reduce latency, and support disaster recovery. Many of our customers rely on solutions like Virtual Private Cloud (VPC) peering, Network Address Translation (NAT) gateways, and AWS Transit Gateways to securely send telemetry to Datadog across regions. These methods work but can add complexity, increase costs, and create potential security risks.