Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

How to Use Mailvelope for Encrypted Email on Gmail

In the previous blog we covered how to use PGP keys for encrypting and decrypting emails on desktop clients like Thunderbird and Outlook. Now, let's take a look on securing your emails without too much hassle using OpenPGP on webmail services like Gmail using the Mailvelope extension for Google Chrome.

Active Defense and Offensive Security: The Two Sides of a Proactive Cyber Defense Program

Offensive security and active defense may appear at first glance as contradictory cybersecurity solutions, but when paired, they create complementary and robust protective solutions. Let's take a quick look at what each solution offers before we go into the details. Offensive security involves attempting to identify flaws in an organization before a threat actor has a chance to exploit them.

DPDP vs. GDPR: Navigating the Complexities of Data Protection Compliance

As data privacy concerns rise globally, regulations like the General Data Protection Regulation (GDPR) in the European Union and the Digital Personal Data Protection (DPDP) Act in India have been established to safeguard personal information. While both frameworks aim to protect individuals’ data, they vary in scope, requirements, and enforcement. In this blog, we’ll explore the similarities and differences between DPDP and GDPR, focusing on key regulatory requirements.

Code Lens Evaluation with Regal and the OPA VS Code extension

Our VP of Marketing, William Chia, in a conversation with our DevRel lead Anders Eknert about the new Code Lens Evaluation feature that just landed in Regal. A conversation that quickly turns into a demo! Watch to see how the feedback loop of Rego development now is shorter than ever, and will change the way you author your policies. Rego development experience taken to a whole new level!

The 443 Podcast - Episode 303 - Leaking Every American's SSN

This week on the podcast, we cover the National Public Data breach that may have leaked every American's social security number. After that, we discuss research from TALOS on how attackers can abuse Microsoft applications on macOS to gain access to your camera and microphone. We end the episode by discussing recent research on how attackers are attempting to evade Endpoint Detection and Response (EDR) tools.

Protecting Personal Identifiable Information in AI: Best Practices for Enterprises

Personal Identifiable Information (PII) includes sensitive data such as social security and passport numbers, as well as biometric data like faces and fingerprints. When training or refining Large Language Models (LLMs), there’s a risk of accidentally including PII, leading to significant real-world consequences like identity theft, privacy violations, and financial losses.

An Inside Look at Detecting API Security Risks with Panoptica

API attacks are predicted to become the most frequent attack vector for cloud ecosystems. How can organizations address API security risks? In this video, Tim Szigeti, Distinguished Technical Marketing Engineer at Outshift by Cisco, shares a quick demo of Panoptica’s API security dashboard. See how you can use the Panoptica CNAPP to get the full picture of your overall security posture, including internal, external, and third-party APIs, evaluate findings, and take next steps to secure your cloud.