Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Synthesia Became One of Europe's Fastest-growing AI Companies | Frameworks for Growth

In this episode of Frameworks for Growth, Vanta CEO Christina Cacioppo sits down with Steffen Tjerrild, co-founder and COO/CFO of Synthesia, to talk about what it takes to scale one of the UK’s fastest-growing AI companies. They explore the future of AI-generated video, how Synthesia built category-defining technology, and why European values may shape the next chapter of AI development. Topics covered.

4 ways to scale compliance with AI

You got compliant—congrats! That’s a big milestone. It tells customers, investors, and the world that you take security seriously. But compliance doesn’t stop at your first audit. As your company grows, so do the requirements. You’ll have to manage new frameworks, more policies, faster timelines, more scrutiny, and more complexity. ‍ Modern GRC teams need to do more with less.

Maximizing Your Security Investment with the Microsoft Azure Consumption Commitment (MACC)

If your organization has a Microsoft Azure Consumption Commitment (MACC), you’re already on the path to optimizing cloud spend. But are you making the most of it? MACC isn’t just a budgeting tool, it’s a strategic advantage. By transacting eligible solutions through the Azure Marketplace, you can decrement your commitment while accelerating your cloud security and operations. That’s where BlueVoyant comes in.

How to Operationalize Enterprise Security Content Update (ESCU) Content

The Splunk Enterprise Security Content Update (ESCU) app is a powerful resource developed by the Splunk Threat Research Team. It provides out-of-the-box detection analytics mapped to the MITRE ATT&CK framework and tailored to various platforms such as Windows, Linux, and cloud environments. While installing ESCU is straightforward, operationalizing the content - meaning tuning, enabling, and maintaining it for real-world use - requires a few deliberate steps.

Salesloft Drift incident overview and CyberArk's response

It was recently reported that Salesloft’s Drift application was breached, allowing unauthorized access to its customers’ Salesforce data and affecting hundreds of organizations, including CyberArk. Upon learning of this incident, we quickly deployed threat containment measures, including terminating our Salesforce–Drift connection; disabling the Drift application and revoking all related user credentials; and rotating all Salesforce integration credentials.

Why Detection? Why Now? Key Takeaways from the NIST NCCoE Public COI Working Session

In April, I had the amazing opportunity to participate in a unique AI security event put on by the National Cybersecurity Center of Excellence (NCCoE). The April event was all about getting the community together to discuss what a Cyber AI Profile should look like as an overlay to the NIST Cybersecurity Framework (CSF) 2.0.

The xAI Wake-Up Call: A CISO's Guide to Preventing Data Exfiltration

The recent lawsuit filed by xAI against former engineer Xuechen Li should serve as a critical wake-up call for every CISO. When a trusted engineer can allegedly download proprietary Grok IP, and jump to a competitor, it exposes fundamental gaps in how we protect our most valuable digital assets. This isn't just about one rogue employee. It's about the reality that your company's most sensitive data is at the risk of exfiltration every day—in laptops, SaaS and AI apps, endpoints and browsers.

EMBER2024: Advancing the Training of Cybersecurity ML Models Against Evasive Malware

CrowdStrike data scientists are members of a team of cybersecurity researchers that recently released EMBER2024, an update to EMBER, the popular open source malware benchmark dataset originally released in 2018. The EMBER2024 dataset includes metadata, labels, and calculated features for over 3.2 million files from six different file formats.

How Arctic Wolf Managed Risk Helps Your Organization Manage the Attack Surface

With Arctic Wolf Managed Risk, organizations can monitor their risk score, discover and assess risks in the environment, report on assets and prioritize remediation activities to the entire security environment. Learn how Arctic Wolf Managed Risk empowers you to discover, assess, and harden your environment against digital risks by contextualizing the attack surface coverage across your networks, endpoints, and cloud environments.