Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

European Regulator Fines Facebook Parent Meta $276 Million for Data-Scraping Breach

A leading European regulator fined Meta Platforms Inc., the company that owns Facebook, 265 million euros, or around $276 million, for failing to better protect the phone numbers and other personal information of more than half a billion users from so-called data scrapers.

Zeek on Windows

As we shared at ZeekWeek 2022 in October, we’re thrilled to announce emerging support for Zeek on Windows, thanks to an open-source contribution from Microsoft. Part of its integration of Zeek into its Defender for Endpoint security platform, this contribution provides fully-native build support for Windows platforms and opens up a range of future technical possibilities in this vast ecosystem.

How to verify and secure your Mastodon account

Mastodon, the free open source self-hosted federated social network platform, has been witnessing a surge of interest and new users due to the recent developments on Twitter — specifically that of verifying accounts. One of the interest areas driving users to Mastodon has been the ability to verify their account identity and convey a sense of authenticity for the account. This provides a way to help prevent spam accounts, bots, and other issues related to fake news.

Cryptojacking Attacks See Growth Despite Weak Year for Cryptocurrency

2022 has seen a slowdown for the cryptocurrency ecosystem, as well as a decrease in demand for cryptocurrency-related activities like cryptomining. Even before the catastrophic implosion of the FTX cryptocurrency exchange, multiple market bubbles (from failed exchanges other than FTX) and events like Ethereum’s highly anticipated transition from proof of work to proof of stake have dampened enthusiasm for cryptocurrencies.

How to Overcome Access Governance Challenges in Multi-Cloud Environments

Identity governance, also known as access governance, is an integral part of any enterprise data protection and compliance framework. Seamless and timely access to required systems or resources can significantly increase employees’ productivity and performance. However, excessive privileges or unmonitored user access can often lead to internal and external cybersecurity threats, such as insider attacks, data breaches, and unauthorized access.

How MSPs can boost the adoption of unified security

Adopting robust processes to identify, classify, remediate, and mitigate vulnerabilities before attackers can exploit them is a new imperative in corporate environments. An efficient, proactive cybersecurity strategy must be multi-layered and able to consider challenges from all angles. Although increasing the number of solutions deployed to protect the attack surface may appear to be the answer, the opposite is true.

Despite Security Scrutiny on Tech Industry, Nearly One-fourth of Applications Have High-severity Flaws

The United States, United Kingdom and other governments around the globe are making strides to defend against software supply chain attacks and strengthen the cybersecurity resilience of their departments, partners, and stakeholders.

New in Vanta | November 2022

‍ ‍ We're thrilled to announce our enhanced Access Reviews solution. Access Reviews is a robust, automated offering that aligns to the main stages of an access review. It makes it easy to perform reviews on a proactive, continuous basis; not just point-in-time reviews for compliance purposes. The result is faster, more accurate reviews that lead to streamlined audits, lower labor costs, and a stronger security posture. Access Reviews is now available for purchase.