Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Third-Party Vendor Risk Management in U.S. Treasury Operations

The U.S. Treasury, also known as the Department of the Treasury, manages the finances of the U.S. government. This department has various duties, including maintaining the economic stability of the United States, managing government finances, and implementing policy decisions that impact both domestic and international affairs. Like most large organizations, the U.S.

TPRM for Government Contractors: General Services Administration Policies

The U.S. General Services Administration (GSA) is an independent agency that helps manage and support the basic functioning of federal agencies. The GSA supplies products and communications, provides transportation and office space, and oversees the government’s real estate portfolio, among other management tasks.

March Release Rollup: "Ask AI" on Desktop and Mobile App, Geo Location Search, Egnyte for Salesforce - Metadata for Folders and More

This month's product updates and enhancements rollup includes “Ask AI” on Desktop and Mobile App, Geo Location Search, and Egnyte for Salesforce – Metadata for Folders. Below is a summary of these and other new releases. Visit the articles linked below for more details.

Celebrating 1,000 reviews on G2 and our first-ever Customer Week

Everything we do at Vanta, from the products we build to the support we deliver, is focused on putting customers first. So we’re especially excited to share our latest customer milestone. ‍ We’ve crossed 1,000 reviews on G2 and for the sixth consecutive quarter, Vanta has been named the #1 Leader in G2’s Grid® Report for Security Compliance | Spring 2024.

How a Private Cloud Approach to SASE Helped Reduce Disruption From a Severed Sub-sea Cable

It feels like sub-sea cable disruptions are becoming ever more common, with recent reports of major outages caused by severed cables in the Mediterranean, the Red Sea, the North Sea, and—most recently—off the coast of Africa.

Winning the 10G Race with Cato

The rapidly evolving technology and digital transformation landscape has ushered in increased requirements for high-speed connectivity to accommodate high-bandwidth application and service demands. Numerous use cases, such as streaming media, internet gaming, complex data analytics, and real-time collaboration, require we go beyond today’s connectivity trends to define new ones.

Does a VPN Protect You From Hackers?

While VPNs may protect you from some types of cyber attacks launched by hackers, they don’t protect you from all of them. For example, VPNs may protect you from Man-in-the-Middle (MITM) attacks, remote hacking, Distributed Denial-of-Service (DDoS) attacks and session hijacking, but VPNs will not protect you from hackers who steal encryption keys, or from account compromise, phishing attacks or illegitimate websites.

CVE-2024-3094: Detecting the SSHD backdoor in XZ Utils

On March 29th, 2024, a backdoor in a popular package called XZ Utils was announced on the Openwall mailing list. This utility includes a library called liblzma which is used by SSHD, a critical part of the Internet infrastructure used for remote access. When loaded, the CVE-2024-3094 affects the authentication of SSHD potentially allowing intruders access regardless of the method.