Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Build, test, and scale detections as code with Datadog Cloud SIEM

Security teams often struggle to keep up with rapidly evolving threats, especially when they have to manually manage detection rules. Without automation or version control, it's difficult to maintain consistency across environments, track changes, or deploy updates quickly. Datadog Cloud SIEM supports detection as code, a structured approach to authoring, testing, deploying, and managing detection rules using code and infrastructure-as-code tools like Terraform.

vCISO or Fractional CISO: Which Is Right for Your Business?

A virtual Chief Information Security Officer (vCISO) is a senior cybersecurity leader who works remotely with your business, typically on a part-time, retainer, or per project basis. They bring with them the expertise of a full-time CISO minus the expense of hiring one in-house. vCISOs tend to be brought in to help shape security, strategy, manage risk, and guide businesses through compliance frameworks such as GDPR, ISO 27001, or Cyber Essentials.

Why AWS-native companies choose Vanta for compliance

Building products while pursuing compliance frameworks like SOC 2 or HIPAA can feel complex and time-consuming. Challenges such as unclear integrations, manual evidence collection, and procurement delays are common, but with AWS-native automation tools, companies can overcome these hurdles and accelerate their compliance journey. ‍ In this post, we'll break down three core ways Vanta simplifies compliance for cloud-forward teams, so you can move faster, stay secure, and focus on building. ‍

The Howler Episode 19: Todd Warner, SVP of Customer Success

This month, we sit down with Todd Warner, Senior Vice President of Customer Success, as he shares the best leadership advice he's ever received, why he loves working in customer success, his love of swim spas, and much more! Todd Warner is the SVP of Customer Success at Arctic Wolf, where he focuses on taking care of our customers and leading the CS team. With 10+ years leading and building CS teams and 10+ years in various sales roles, he has learned the importance of listening to customers and working toward outcomes that best suit their needs.

Innovations in Splunk Security Expands Unified TDIR Experience to On-Premises and FedRamp Moderate Environments

At RSAC 2025 Conference we announced new innovations to Splunk Security. Today, we are pleased to announce the general availability of Splunk Enterprise Security 8.1. Splunk becomes the only vendor to bring truly unified threat detection, investigation, and response (TDIR) workflows fueled by automation to both customer managed deployments and FedRAMP Moderate environments.

OpenAI Report Describes AI-Assisted Social Engineering Attacks

OpenAI has published a report looking at AI-enabled malicious activity, noting that threat actors are increasingly using AI tools to assist in social engineering attacks and influence operations. In one case, the company banned ChatGPT accounts that were likely being used in North Korean attempts to fraudulently obtain jobs at US companies. “Similar to the threat actors we disrupted and wrote about in February, the latest campaigns attempted to use AI at each step of the employment process.

Keeper Security Named Overall Leader in 2025 GigaOm Radar Report for Enterprise Password Management

GigaOm, a renowned technology analyst firm, has recognized Keeper Security as the Overall Leader in Enterprise Password Management for the fourth year in a row. The GigaOm 2025 Radar Report for Enterprise Password Management highlights Keeper’s Privileged Access Management (PAM) solution, KeeperPAM, which helps organizations secure passwords, credentials, secrets and connections to mitigate cyber risks and defend against internal and external threats.

What To Know About the UNFI Cyber Attack

On June 9, 2025, United Natural Foods, Inc. (UNFI) – a major organic food distributor and the main grocery supplier for Whole Foods Market – reported a cyber attack. UNFI first discovered unauthorized activity in its IT systems on June 5 and immediately took some systems offline. At the time of this writing, the investigation is ongoing as officials assess the full impact of the breach.

What does 'software reachability granularity' really mean 2nd Episode

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.