Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Vanta continues to lead the G2 Grid for Security Compliance

We’re excited to share that for the fifth quarter in a row, Vanta has been named the #1 Leader in G2’s Grid® Report for Security Compliance | Winter 2024. ‍ Recently crossing 800 reviews on G2, Vanta also continues to be recognized as a leader in Cloud Compliance, Cloud Security, Vendor Security and Privacy Assessment, and Vendor Management, achieving top placement in 18 categories.

Navigating the Cybersecurity Horizon in 2024

In 2023, organizations faced a surge in ransomware attacks, prompting a reevaluation of cybersecurity readiness. The focus on high-value assets and critical infrastructure indicated an escalating threat landscape, demanding stronger preemptive measures. This trend is expected to continue in 2024 as cybercriminals exploit vulnerabilities.

Nightfall named a 2024 leader in Data Loss Prevention (DLP)

It’s official: Nightfall has been named as a leader in Data Loss Prevention (DLP), data security, and sensitive data discovery by G2’s peer-reviewed marketplace. At Nightfall, our goal is to help customers to discover, classify, and protect their sensitive data across the cloud.

Australia's cybersecurity strategy is here and Cloudflare is all in

We are thrilled about Australia’s strategic direction to build a world-leading cyber nation by 2030. As a world-leading cybersecurity company whose mission is to help build a better Internet, we think we can help. Cloudflare empowers organizations to make their employees, applications and networks faster and more secure everywhere, while reducing complexity and cost.

Top 3 security best practices for handling JWTs

In modern web development, JSON Web Tokens (JWTs) have become a popular method of securely transmitting information between parties. JWTs are used for authentication and authorization and are often used to store user information. However, with the increasing use of JWTs come potential security risks that developers need to be aware of. As a developer, you are responsible for ensuring that your application is secure and user data is protected.

The Rise of Automotive Hacking

The automotive industry stands at the crossroads of innovation and vulnerability. As cars become increasingly connected, with advanced systems and features that rely on intricate software, the rise of automotive hacking has become a pressing concern. The convergence of traditional mechanical engineering and cutting-edge software has given rise to a new breed of threats that extend beyond physical security, delving into the digital realm of vehicle control systems.

Welltok's MOVEit Breach Returns; Data Stolen from 17 West Virginia Hospitals

The West Virginia University Health System (WVUHS) contains multiple institution locations, hospitals, and clinics. Welltok is a communications platform that allows patients and physicians to speak while encouraging healthy lifestyles. Like thousands of other medical providers, Welltok utilizes a third-party vendor to manage and maintain patient information; this vendor is Progress Software’s MOVEit.

Behind the Scenes: JaskaGO's Coordinated Strike on macOS and Windows

In recent developments, a sophisticated malware stealer strain crafted in the Go programming language has been discovered by AT&T Alien Labs, posing a severe threat to both Windows and macOS operating systems. As of the time of publishing of this article, traditional antivirus solutions have low or even non-existent detection rates, making it a stealthy and formidable adversary.

How to Create an Effective Services Page on a Website

The "Services" page is the page where the user can get more specifically acquainted with your offer, find out how you differ from your competitors, and in some cases, the price. Usually they come to it from the main page, having already received a first impression of you, having learned your name, and, possibly, your USP. Your main task on the "Services" page is to tell about what you do so that the visitor immediately reaches for the "Order" button or to their phone.