Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Strategies for accelerating a successful log migration

Log management becomes more challenging as both log volume and diversity rapidly grow. Yet many companies still rely on legacy log management and SIEM solutions that aren’t designed to cost-effectively or securely handle the large scale of logs today coming from sources both in the cloud and on premises.

Identify risky behavior in cloud environments

Risk assessment requires context. One of the primary challenges with protecting cloud environments is understanding how certain activity can lead to risk. Risky behavior can be categorized as any activity or action that increases the likelihood of an attack in your cloud environment. While certain activity may not be malicious on its own, it can expand an environment’s attack surface or indicate post-compromise behavior.

The Fast Eat the Slow: AI Adoption for Survival in Modern Cybersecurity

John Quinsey (also known as “JQ”) is a regional director at Torq with 25 years in software and SaaS sales, solving business problems with disruptive technologies. He firmly believes AI has the power to revolutionize modern security operations. Just five years ago, the average dwell time for a ransomware attack was seven months. Today, it’s five days and shrinking.

Hidden Threats in Our Power Grid: The Chinese Transformer Backdoor Scandal

America's critical infrastructure faces an unprecedented threat, and it's already installed in hundreds of locations across the nation. Recent investigations confirm that Chinese-manufactured power transformers—essential components of our electrical grid—have been discovered with hidden capabilities allowing remote shutdown from overseas. In summer 2019, federal authorities seized a massive 500,000-pound Chinese transformer at the Port of Houston.

CrowdStrike Research: Securing AI-Generated Code with Multiple Self-Learning AI Agents

Applying robust security measures to automated software development is no longer a luxury but a necessity. CrowdStrike data scientists have developed an AI-driven, multi-agent proof of concept that leverages Red Teaming capabilities to identify vulnerabilities in code developed by AI agents. While it is still in the research stage, our work shows this advanced AI technology has the potential to revolutionize software security.

Energy Under Siege: How the Industry is Fighting Against Cyber Attacks

The energy sector has become a prime target for cyberattacks, with successful breaches posing severe risks to national security, economic stability, and public safety. Luckily, the industry is standing up and taking notice, with two-thirds of energy professionals (65%) now saying their leadership now sees cybersecurity as the greatest risk to their business.

Article 7 of GDPR: Preserving Data Integrity in Image Publication

For all the tremendous opportunities that the digitization of business operations has unlocked, there are also complex security and data privacy challenges that organizations have to navigate. In the interests of business privacy and security, legislation exists to hold organizations and policymakers to account. None are perhaps more influential and necessary than the EU’s General Data Protection Regulation (GDPR).

Going beyond the standard: Key takeaways from VantaCon UK 2025

Our second annual VantaCon UK event featured thought-provoking conversions with founders, CISOs, and security leaders from Synthesia, Okta, Klarna, Pigment, Multiverse, and more. ‍ During the event, speakers touched on the complexities of building trust in the age of AI, discussed specific regulatory challenges in the EU, and shared practical tips for modern CISOs operating amidst an evolving regulatory landscape and complex risk environment.

Solving Tool Sprawl: Consolidating Your Security Stack with the SecOps Cloud Platform

Your security team is drowning in alerts from dozens of disconnected tools. Analysts toggle between 15 different dashboards and browser tabs while critical threats slip through the cracks. Sound familiar? With organizations using an average of 60 to 75 security tools, it's becoming increasingly difficult for analysts to effectively monitor and respond to threats.

Watch Out for Websites Impersonating Tax Providers and the IRS During Tax Season

Before you click on that email or open that text message — is that really the United States Internal Revenue Service (IRS) or your tax provider? It may not be. BlueVoyant has identified dozens of websites impersonating the IRS, posing a risk to online users. These phishing sites likely aim to steal sensitive information by tricking users into believing they are interacting with the legitimate IRS website. Here are some examples of the phishing sites uncovered by BlueVoyant.