Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Case of False Positives and Negatives in AI Privacy Tools [How to Reduce IT]

GenAI has revolutionized the way businesses interact with data. Thanks to easy accessibility and automation capabilities, it is increasingly becoming a part of more business workflows. If something sounds too good to be true, there’s usually a catch. GenAI works by continuously processing and improving on the data fed into it – often sensitive data, making privacy a tradeoff. Tools like Gemini, Claude, and ChatGPT are becoming the most common shadow IT tools.

Top Insider Threat Software for Enterprises in 2026

Most insider threat programs start with the same question: What is a user doing? That is the right question to start with, but the wrong one to stop at. The more important question is what happened to the data. An employee who uploads a sensitive file to a personal Google Drive account at 11 p.m. the night before they resign is a clear signal. But what about the engineer who gradually copies source code fragments into a generative AI (genAI) coding assistant over three months?

Private Status Page: A Comprehensive Guide

Private status pages are very special websites used to maintain transparent communication between the company's employees and other stakeholders. It's mostly used for important performance updates but also for disruption and downtime notifications (and every other problem that should be addressed on short notice). The purpose of any private status page is to encourage communication and support to those who have access to it, providing updates on issue status and incident management.

The new standard of Kubernetes misconfiguration remediation

According to research done by ARMO, 100% of Kubernetes clusters that were tested contained at least one misconfiguration, while 65% had at least one high-severity misconfiguration. 50% of clusters had 14 or more failed security controls. According to Redhat research from 2023, 45% of respondents experienced security incidents or issues related to containers and/or Kubernetes due to misconfigurations.

3 Things You Need to Know About the Okta Breach

In a recent security breach, a threat actor with stolen credentials was able to access Okta’s support case management system. That support case management system contained several HAR files, or HTTP Archive files, in support tickets. A HAR file is a JSON-based file format that records and stores detailed information about the interactions between a web browser and a website.

Detecting Malicious Activity in Microsoft 365

Microsoft 365 is a prime target for adversaries, with objectives ranging from credential harvesting to ransomware. However, managing detection rules can be a cumbersome task, especially as security analysts try to keep up with the ever-changing landscape of telemetry options from Microsoft.

Introducing Cyber Essentials and Essential Eight: Putting customers first globally

Just a little over a year ago, Vanta went global with the opening of a European headquarters in Dublin as well as an office in Sydney. And over the past several quarters, we’ve accelerated international momentum by scaling investments across the product and business, from opening our EU data centre to rolling out localised product capabilities, in-region technical support, and more.

[Webinar] Increase visibility and federal IT network security with Tanium + ServiceNow

In the U.S. Federal Government, too often the superset of assets that need to be managed across an entire department or agency aren’t well understood. Many of the latest executive orders, binding operational directives, and even the most recent White House Cybersecurity Strategy all point to a foundational piece of reducing your attack surface: having an accurate inventory of your assets.