Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Exploring the risks of eye-tracking technology in VR security

Virtual reality (VR) offers profound benefits across industries, particularly in education and training, thanks to its immersive nature. Through derivatives, such as 3D learning environments, VR enables learners to gain a deeper understanding of theoretical concepts more quickly and efficiently.

5 Best Practices to Secure Azure Resources

Cloud computing has become the backbone for modern businesses due to its scalability, flexibility and cost-efficiency. As organizations choose cloud service providers to power their technological transformations, they must also properly secure their cloud environments to protect sensitive data, maintain privacy and comply with stringent regulatory requirements.

Elevating a Housing Association's Security Posture with Managed XDR for Microsoft

Learn about careers with us and search open job opportunities here. As one of the largest housing associations in the UK, Southern Housing was concerned about being targeted due to a sharp increase in cyberattacks on its industry. The organization also needed to broaden its defenses in response to the shift to remote and hybrid working.

Nightfall was built on AI. Here's how we're advancing our mission to scale data protection in the enterprise.

Back in 2018, Rohan and I founded Nightfall on the belief that AI could make data leak prevention (DLP) better, faster, and more accessible to every enterprise. At the time, Rohan was a founding engineer at Uber Eats, and I was an investor at Venrock specializing in SaaS and security. From these respective vantage points, we could see that legacy solutions weren’t working, and could never keep up with the evolving threat landscape.

Top 5 Data Breaches That Cost Millions

“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there’s a key hidden somewhere, they won’t stop until they find it.” - Tim Cook, CEO of Apple Inc. The entire digital landscape has evolved into a behemoth of sorts as the number of online attacks targeting individuals, businesses, and governments has risen steadily.

Understanding ITAR Compliance: A Guide for Australian Companies

The United States and Australian Governments have established strict regulations to safeguard the technology that can be used for military applications. The most sensitive technology is regulated by the U.S. International Traffic in Arms Regulations (ITAR), and it is imperative for any company working with ITAR-controlled technologies and data to comply with these regulations. Failure to comply can lead to severe legal and financial repercussions, as well as reputational damage.

ISO/SAE 21434 compliance in 2024: what's new and how to act

Most modern vehicles are equipped with a variety of software systems and resemble sophisticated computers on wheels. The ISO/SAE 21434 standard is a framework that provides recommendations and requirements for secure software development in the automotive industry. But what is ISO 21434 exactly? And what can we expect from automotive software security in 2024? Read on and find out!

Monitor your secure workloads on Kata Containers with Datadog

Kata Containers is an open source project that seeks to enhance security for containers by isolating them in lightweight VMs. Each Kata Container runs with the speed and flexibility of standard containers, and it easily integrates with common container management software—including Docker and Kubernetes.

Cyber Essentials Overview

Cyber Essentials is a certification scheme developed by the National Cyber Security Centre (NCSC) in the United Kingdom. This scheme aims to help organisations establish a baseline of cyber security controls to protect against common cyber attacks. Two levels of certification are offered under the Cyber Essentials scheme: Cyber Essentials and Cyber Essentials Plus.

Magic Links vs Passkeys: What's the Difference?

While both magic links and passkeys are methods of passwordless authentication, they’re not exactly the same. Some of the key differences between magic links and passkeys are how they work, their security, where a website server stores them and whether or not they expire after being used to log in to an account. Continue reading to learn more about what makes magic links and passkeys different and similar to one another.