Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

3 Tips for Enterprise Patch Management

We have recently concluded the first quarter of 2023, and there have already been over 250 patches for the many components and flavours of Microsoft’s operating systems, as well as a handful of patches for Adobe, Apple, and Android. If you are a computer professional, you have also had to patch various other enterprise-class hardware and software assets in your environment. With all of the technology we have today, installing software updates has become a near-daily, full-time activity.

Vanta expands CrowdStrike partnership and announces 3 new investors

At Vanta, we’re on a mission to secure the internet and protect consumer data by transforming the way companies meet their security compliance and establish and deepen trust with their customers, vendors, and partners. Today we’re excited to share several announcements that help us achieve our mission.

Securing Your Mobile Apps: Learnings from Google's Fight Against Bad Apps

Mobile app security is a critical aspect of any digital infrastructure. With our increasing need and reliance on smartphones as both communication and entertainment devices, mobile apps have become magnets for malicious actors. As such, companies like Google and Apple are implementing stringent measures to protect their app stores.

From zero to breach in seconds: Why you need to focus on software supply chain security now

The RSA Conference 2023 addressed several key issues and trends in the cybersecurity industry. Generative AI was a key topic of discussion, with attendees, executives and policymakers seeing its potential in both offense and defense in the cybersecurity arms race.

Your Security Guide to Insider Threat Protection: 10 Best Practices to Follow

Insider incidents, whether intentional or unintentional, can harm your organization in the form of financial and reputational losses, compliance violations and fines, and operational disruptions. What can you do to avoid this? How can you protect yourself against insider threats? The solution is simple: fortify your organization’s security processes with a carefully executed insider threat strategy.

The Metropolitan Opera House Gets Hit Be a Breach, Exposing 45,000 Patrons

The Metropolitan Opera is a well-established opera house that opened its doors in 1883 and has been putting on dozens of operas each year. The Met is an impressive establishment that employs more than 900 individuals, and it stores a substantial amount of customer data during its regular operations. This well-known opera house recently got hit by a data breach that puts its customers in real danger.

APTs in 2023: Characteristics, Phases & Defending Against Advanced Persistent Threats

When it comes to cyber threats, few are as feared as Advanced Persistent Threats. An Advanced Persistent Threat (APT) is a sophisticated, highly targeted and often long-term cyberattack orchestrated by well-funded and highly skilled threat actors. In some cases, they’re even backed by governments: North Korea, Russia and China have all been caught orchestrating APT attacks in the past two years. APTs differ from traditional cyber threats, which are more persistent, targeted, and sophisticated.

Bug Bounty Programs Explained: Proactively Finding Bugs for Enhanced Security

The digital world is a lot like the Old West: lawless criminals are looking to take advantage of any bug, flaw or vulnerability to exploit. To combat the problems from these flaws, many organizations offer bounties to anyone who can find them before cybercriminals. Because bugs can be challenging to spot, bug bounty programs leverage ethical hackers' expertise to spot corporate software's flaws. Some of the largest corporations in the world, including Google, Microsoft, and the U.S.

Data Encryption At Rest vs In Motion in Microsoft 365

Data is the most important resource that a company possesses. Any data loss event can be extremely disruptive, with serious consequences including regulatory fines, major revenue loss, and reputational damage. Data encryption is crucial for any organizations that deal with sensitive data including customer and employee information, payment details, company financials, M&A documents, government and defense data, and more.