Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Meeting the 555 Benchmark

How long does it take your security teams to detect a potential threat, correlate relevant data, and initiate a response action? The 555 Benchmark for Cloud Detection and Response challenges organizations to detect a threat within 5 seconds, correlate data within 5 minutes, and initiate a response within 5 minutes. It is not just something you can implement or use to solve your cloud security struggles. It is about testing and improving your cloud security operations and processes.

How to Build a Data Breach Response Plan

Businesses of all shapes and sizes can fall victim to data breaches. Unfortunately, even with the best privacy and security measures in place, hackers are continually becoming more skilled at beating them. A well designed and implemented data breach response plan is essential if businesses are to minimize the effect of data breaches and protect their reputation. Not only that, but they can reduce the financial damage to the business and better position the organization for recovery.

Understanding the Cyber Risks in Video Communication

With the surge in remote work and virtual meetings, video communication is crucial for businesses and individuals. However, this convenience comes with significant cyber risks that can compromise sensitive information and privacy. Therefore, this article explores the common cyber threats in video communication and provides strategies to mitigate them.

Breaking caches and bypassing Istio RBAC with HTTP response header injection

After our recent successes exploring WebSocket Hijacking vulnerabilities, we decided to expand this research project into other attacks that involve WebSockets. We started by looking at WebSocket smuggling attacks and expanded our scope to include HTTP response header injection attacks and potential novel impacts.

4 Examples of How AI is Being Used to Improve Cybersecurity

Throughout history, technology has been a catalyst for solving many civilizational problems. The advent of artificial intelligence (AI) presents an incredible opportunity to combat cybersecurity risks and bolster the defenses of organizational IT networks. The good news is that it’s already making an impact by reducing the average dwell time of cyber attacks by as much as 15%. But AI holds much more promise.

Expanding the Vanta API to connect auditor tools

Vanta has helped auditors automate and simplify thousands of compliance audits, and we’re now making the process even easier. Today we’re excited to share that we’ve added new endpoints for auditor tools to the Vanta API, leading to a better collaboration experience for auditors and customers. ‍ With our new API endpoints, audit partners can integrate their tools with Vanta, allowing them to work in their preferred systems.