Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Non-repudiation: Your Virtual Shield in Cybersecurity

In the digital world, where countless users communicate, share data, and engage in diverse activities, determining the origin and actions behind these interactions can be quite challenging. This is where non-repudiation steps in. Coupling other security factors, such as delivery proof, identity verification, and a digital signature, creates non-repudiation. This guarantees that the parties involved in the transmission are unable to renounce the execution of an action.

Paris Olympic Games wins cybersecurity silver - how does your attack surface compare?

Using our own proprietary External Attack Surface Management (EASM) solution, Outpost24’s Sweepatic, we have conducted an attack surface analysis on the Paris 2024 Olympic Games online infrastructure. The Paris 2024 cybersecurity team have done plenty right, but we’ve also highlighted some real-life attack surface risks that have slipped through the gaps (and do so for many organizations) including open ports, SSL misconfigurations, cookie consent violations, and domain squatting.

Accelerating the Future of Trust for the Enterprise: Vanta Supercharges Trust Centers with Questionnaire Automation and Vanta AI

Leveraging AI and automation to help enterprises build customer trust and close deals faster. New enterprise-grade capabilities empower large organizations to demonstrate trust at scale. Vanta to debut new offerings at RSA Conference May 6 - 9 in San Francisco.

Aikido lands $17M Series A to bring it's 'no BS' security platform for developers to SMEs world-wide

Ghent-based Aikido, the get-it-done security platform for developers and SMEs, has raised $17M in fresh Series A funds from Singular.vc, joined by Notion Capital and Connect Ventures. The round comes a mere 6 months after Aikido raised $5.3M seed funding, making Aikido the fastest capitalized startup in Belgian history. The funds will be used to expand the platform and push Aikido onto the international stage to make security simple for SMEs and doable for developers.

How to secure PHI with an identity governance solution

Cyberattacks pose a growing threat across all industries, but healthcare is especially vulnerable. In 2023, hacking incidents in the healthcare sector accounted for 79.7% of data breaches. While patients, providers, and policymakers all have a stake in protecting health information, a critical weak point lies with the technology companies that offer electronic health record (EHR) systems. These systems hold a treasure trove of PHI, making them prime targets for cybercriminals.

Dallas AI and Protecto.ai Announce Partnership

Protecto.ai alongside Dallas AI, the leading AI professional group in the Dallas-Fort Worth area, are excited to announce a partnership where Protecto will become an annual sponsor of Dallas AI. This collaboration aims to accelerate the development of secure and ethical AI technologies, while providing robust support to the local developer community through education, resources, and networking opportunities.

17 Ways To Prevent Insider Threats: Steps, Tips & Tools

When you think of cybersecurity, your mind likely goes to external threat actors — malware, ransomware, spearphishing attacks, and other malicious activity. However, it’s crucial to note that 60% of data breaches are caused by insider threats, and a staggering 74% of organizations are at least moderately vulnerable to them. It’s not everybody else your organization needs to worry about; it’s your own people.

Vanta Trust Center, now enhanced with Questionnaire Automation and Vanta AI

As the number and severity of third-party breaches continues to rise, companies are scrutinizing more closely not just how they handle data, but how their vendors do as well. For security leaders, this means more security reviews are coming across their desk everyday. ‍ Limited resources and legacy processes make it hard for security teams to keep up with the pace of business.

Top 5 SaaS misconfigurations to avoid and why

Cloud storage services and SaaS apps like Google Drive and Microsoft OneDrive provide convenient, scalable solutions for managing documents, photos, and more—making them indispensable for modern work and personal life. However, misconfigured settings and permissions can lead to serious security breaches, noncompliance, and even the loss of customer trust. Let’s explore the 5 most common misconfiguration issues with real-world examples.