Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mastering EU AI Act Compliance: Strategies for Data Governance and Security

Organisations must adopt robust compliance strategies to align with the EU AI Act’s stringent requirements. This involves implementing effective data governance frameworks, ensuring data quality and integrity, and leveraging advanced data security solutions.

Navigating the EU AI Act: Why Compliance is Key to AI Innovation and Security

The European Union’s AI Act, set to be enforced in 2025, is set to transform how businesses approach artificial intelligence. Designed to regulate AI development and deployment, the Act aims to ensure ethical, safe, and transparent AI usage. However, many organisations still struggle with compliance.

Is It Possible to Include Patch Management in Your Service Package?

It is no longer surprising that cybercriminals are constantly searching for vulnerabilities to exploit. This is why patch management has become increasingly important in recent years. In fact, Verizon's 2024 Data Breach Investigations Report revealed a significant 180% increase compared to the previous year. This highlights the urgency of having a solid patch management process in place.

What is IPv6? Why you need a smart, integrated IPAM for efficient IPv6 management

Imagine trying to cram a growing population into a city with a limited number of addresses—eventually, you’ll run out of them. That’s exactly what has happened with IPv4, the internet’s original addressing system. With every website, smartphone, laptop, smart TV, and IoT device needing an IP address to connect to the internet, we’ve officially exhausted all 4.3 billion IPv4 addresses!

Top 10 API Security Best Practices

Every day, organizations expose their APIs, unknowingly allowing cybercriminals to try and exploit them. A single vulnerability can lead to massive data breaches or help gain unauthorized access. Worst Part? Most organizations realize the weakness when it’s already too late. Without strong security measures, your API is a prime target for attackers trying to exploit unpatched vulnerabilities or misconfigurations in the environments.

CVE-2025-24813 - Apache Tomcat Vulnerability Under Active Exploitation

On March 17th, 2025, security researchers confirmed active exploitation of Apache Tomcat’s recently disclosed vulnerability, CVE-2025-24813. Publicly disclosed on March 10th, the earliest signs of exploitation were observed on March 12th, with attackers leveraging the flaw just 30 hours after disclosure. This vulnerability enables Remote Code Execution (RCE) and information disclosure by exploiting Tomcat’s request-handling mechanism.

Detecting sensitive data and misconfigurations in AWS and GCP with Cloudflare One

Today is the final day of Security Week 2025, and after a great week of blog posts across a variety of topics, we’re excited to share the latest on Cloudflare’s data security products. This announcement takes us to Cloudflare’s SASE platform, Cloudflare One, used by enterprise security and IT teams to manage the security of their employees, applications, and third-party tools, all in one place.

Enhance data protection in Microsoft Outlook with Cloudflare One's new DLP Assist

Cloudflare Email Security customers using Microsoft Outlook can now enhance their data protection using our new DLP Assist capability. This application scans emails in real time as users compose them, identifying potential data loss prevention (DLP) violations, such as Social Security or credit card numbers. Administrators can instantly alert users of violations and take action downstream, whether by blocking or encrypting messages, to prevent sensitive information from leaking.

Choosing a trusted auditor: 5 key questions to ask your potential auditor

Choosing a trusted auditor is a critical step in your compliance journey. A thorough audit not only validates your security posture but also helps you build trust with your customers. The right auditor can provide valuable insights into your operations, identify potential risks, and suggest improvements to enhance your overall security framework. ‍ Vanta believes it's important to empower you with the knowledge you need to make informed decisions when selecting an auditor.