Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Non-repudiation: Your Virtual Shield in Cybersecurity

In the digital world, where countless users communicate, share data, and engage in diverse activities, determining the origin and actions behind these interactions can be quite challenging. This is where non-repudiation steps in. Coupling other security factors, such as delivery proof, identity verification, and a digital signature, creates non-repudiation. This guarantees that the parties involved in the transmission are unable to renounce the execution of an action.

Accelerating the Future of Trust for the Enterprise: Vanta Supercharges Trust Centers with Questionnaire Automation and Vanta AI

Leveraging AI and automation to help enterprises build customer trust and close deals faster. New enterprise-grade capabilities empower large organizations to demonstrate trust at scale. Vanta to debut new offerings at RSA Conference May 6 - 9 in San Francisco.

Aikido lands $17M Series A to bring it's 'no BS' security platform for developers to SMEs world-wide

Ghent-based Aikido, the get-it-done security platform for developers and SMEs, has raised $17M in fresh Series A funds from Singular.vc, joined by Notion Capital and Connect Ventures. The round comes a mere 6 months after Aikido raised $5.3M seed funding, making Aikido the fastest capitalized startup in Belgian history. The funds will be used to expand the platform and push Aikido onto the international stage to make security simple for SMEs and doable for developers.

How to secure PHI with an identity governance solution

Cyberattacks pose a growing threat across all industries, but healthcare is especially vulnerable. In 2023, hacking incidents in the healthcare sector accounted for 79.7% of data breaches. While patients, providers, and policymakers all have a stake in protecting health information, a critical weak point lies with the technology companies that offer electronic health record (EHR) systems. These systems hold a treasure trove of PHI, making them prime targets for cybercriminals.

Dallas AI and Protecto.ai Announce Partnership

Protecto.ai alongside Dallas AI, the leading AI professional group in the Dallas-Fort Worth area, are excited to announce a partnership where Protecto will become an annual sponsor of Dallas AI. This collaboration aims to accelerate the development of secure and ethical AI technologies, while providing robust support to the local developer community through education, resources, and networking opportunities.

Stories from the SOC - Combating "Security Alert" Scams

The “Security Alert” scam is a prevalent tech-support fraud that threatens both Windows and Apple users. It exploits the trust of users by masquerading as an official support site, using fake pop-up warnings to lure users into dialing scam phone numbers by conveying a sense of urgency. The ultimate goal is gaining remote access to the user’s system and pilfering personal data to extort money.

What Is the RSA Algorithm and How Does It Work?

In today’s digital landscape, cryptography plays a vital role in keeping information secure. Encryption is one of the primary techniques used in cryptography to ensure that data transmission online is secure and that sensitive information stays protected from unauthorized access. Through encryption, organizations and individuals can mitigate the risk of data breaches and ensure that their confidential information remains that way.