Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Modern Cybersecurity Strategies for Linux Servers

Linux servers have become widely adopted across organizations of all sizes. However, the frustrations of integrating these servers have left organizations struggling to implement strong security procedures, which cyberattacks have exploited for years. For instance, the “perfctl” malware family has been targeting Linux servers and attempting to escalate privileges for over three years.

Introducing the Tanium Integrations Gallery for Tanium Cloud: Discover, Deploy, and Manage joint solutions & integrations with Tanium

We are thrilled to announce the general availability of the Tanium Integrations Gallery for Tanium Cloud. This new capability enables users to seamlessly discover, deploy, and manage joint solutions and integrations within the Tanium platform, all without requiring deep technical expertise.

Turn Data Security Question into Answer - Netwrix Access Analyzer Supports Natural Language Prompts

Turn Data Security Questions into Answers - Instantly! With the new MCP integration, Netwrix Access Analyzer supports natural language prompts in tools like Claude Desktop and Microsoft Copilot Studio, helping your team surface actionable insights faster and strengthen your security posture. Just ask: No scripting or digging through dashboards. Just fast, actionable answers, when and where you need them.

Building DLP for a ChatGPT World

Generative AI has gone from a novelty to an essential part of daily workflows across all teams at an organization. Whether it’s ChatGPT, Microsoft Copilot, Claude, or Google Gemini, employees are using chatbots to copy, paste, summarize, and query data at a pace and scale we have never seen before. Unfortunately, data security has not been a fundamental feature of generative AI as the technology’s popularity and functionality has exploded.

Unlocking Profit: How Bankers Can Harness Stablecoins for Revenue Growth

Brian Moynihan recently remarked, “It’s pretty clear there’s going to be a stablecoin… So if they make that legal, we’ll go into that business …it’s just then like another foreign currency.” While the comments from the CEO of Bank of America capture one bank use case for stablecoins, these digital assets have much more to offer banks than that.

How we navigated database limits with a growing product

In 2024, one of Vanta’s engineering goals was to improve the quality while maintaining our rapid product development. Around the same time, we also discovered we were months away from reaching our MongoDB Atlas database storage limit. If this threshold was reached, then we wouldn't be able to write any new data and the Vanta product would’ve been heavily degraded. This was a clear signal that we needed to invest more in our infrastructure and storage solution. ‍

Lack of Security Awareness Tops List of Obstacles to Cyber Defense

Most organizations cite low security awareness among employees as the biggest barrier to defending against cyberattacks, according to a new survey by CyberEdge Group. “This result reinforces the idea that in cybersecurity, as in so many other areas of business and life, people challenges trump technology issues every time,” the researchers write. “Without doubt, although computers speed up every year, people don’t (and some days we suspect they are getting slower).

The Continued Abuse of Legitimate Domains: A Spike in the Exploitation of Google Drive to Send Phishing Attacks

First QuickBooks, then Microsoft, and now Google—will the hijacking of legitimate third-party platform communications stop escalating in 2025? Our Threat Labs researchers predict the answer is no. As long as these attack tactics remain effective, cybercriminals will continue to use them, which likely explains the spike in the exploitation of Google Services for phishing attacks observed in the first month of 2025.