Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Vanta Delivers: Introducing New Products for the Future of Governance, Risk and Compliance (GRC)

Empowering GRC teams to make their security and compliance continuous and automated. Announcing Report Center, enhancements to Vendor Risk Management (VRM), and market-leading milestones for integrations and frameworks.
Featured Post

How Organisations Can Master Incident Reporting Obligations Under NIS2

The new NIS2 directive is designed to strengthen the cyber resilience of over 160,000 companies that operate in the EU - either directly or indirectly. Coming into force by 17th October, NIS2 regulations will outline how these essential entities can combat increasingly sophisticated and frequent cyber attacks.

Understanding Incident Reporting Under the NIS2 Directive: Key Insights for Managed Service Providers and Managed Security Service Providers

Incident reporting is a crucial component of maintaining cybersecurity and operational resilience across the European Union. As outlined in Article 23 of the NIS2 Directive entities falling under its scope are required to report “significant incidents” to the CSIRT (Computer Security Incident Response Team or the relevant competent authority without undue delay.

Introducing GitGuardian Software Composition Analysis (SCA)

Introducing GitGuardian Software Composition Analysis, further expanding the capabilities of our code security platform. You have long known GitGuardian for secrets detection and remediation, honeytokens, and IaC scanning. Now, with GitGuardian SCA, you can effortlessly scan your applications to detect known vulnerabilities introduced through both Direct & Transitive dependencies. The platform will automatically prioritize incidents depending on their context and help developers find the best path to remediating any issues.

Cyber security measures for small and medium enterprises (SMEs)

The risk of cyber attacks for companies is increasing and can significantly disrupt their operations, have negative financial consequences and damage their reputation. Small and medium enterprises (SMEs) are especially vulnerable to these attacks due to limited resources and a lack of cyber security expertise. Understanding the significance of cyber security is crucial for protecting sensitive data and ensuring business continuity.

Cloudy with a chance of breach: advanced threat hunting strategies for a hyperconnected and SaaSy world

When workloads moved to the cloud, a huge burden was lifted from the enterprise in infrastructure and operational overhead. This transition also brought with it the “shared responsibility” model, where cloud providers took on much of the responsibility previously relegated to expensive engineering teams.