Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Meet the Founders of Protecto: Securing Data for Agentic AI

In this video, we introduce the visionary founders behind Protecto — a company on a mission to make AI safe and compliant for the enterprise era. Amar Kanagaraj, Founder & CEO A second-time entrepreneur, Amar previously led a startup to a successful exit. He began his career as a developer at Sun Microsystems, then went on to lead product management for Microsoft Search & AI. With an MBA from Carnegie Mellon and an MS in Computer Science from LSU, Amar brings a powerful blend of business and technical insight to Protecto.

Building the Anthropic Team: Daniela Amodei on Hiring 10x AI Engineers | Frameworks for Growth

In this episode of Frameworks for Growth, Vanta CEO Christina Cacioppo sits down with Daniela Amodei, President and Co-founder of Anthropic, to discuss what it takes to build both a mission-driven company and a cutting-edge AI research lab. They explore how Daniela approaches hiring with intention, how to scale responsibly in the age of AI, and what it means to build trust while working on transformative technologies like Claude.

What to Do After a Vulnerability Is Found: From Risk Mitigation to Automated Remediation

The Real Breach is in Delay, Not Detection Detecting vulnerabilities is no longer the hard part. With powerful scanners, continuous monitoring, and security frameworks in place, most organizations can identify weaknesses in their systems quickly. But the real risk begins after a vulnerability is found. According to the Verizon 2025 DBIR, released on April 23, there has been a 34% increase in successful vulnerability exploitations over the past year, compounding a 180% rise from the previous report.

What Are the Common Challenges of Implementing PAM?

Implementing a Privileged Access Management (PAM) solution is essential to securing an organization’s most sensitive data. However, IT teams often face challenges in effectively deploying a PAM solution that satisfies both security and compliance requirements. Common challenges include complex integration with existing systems, scalability limitations and poor user experience. Continue reading to learn more about the challenges organizations face when implementing PAM and how to overcome them.

Lockdown Android Tablet for Business with miniOrange MDM

Thinking of using Android tablets for your business? Great choice—but unmanaged tablets can lead to data risks and distractions. In this blog, we’ll walk you through how to lockdown Android tablets using a Mobile Device Management (MDM) solution. Whether you are running a retail store, managing field staff, or setting up kiosks, learn how to restrict tablets to only business apps and tasks.

Proving the ROI of Vulnerability Assessments: A CISO Guide

In cybersecurity, the value of vulnerability assessments (VA) is widely acknowledged but not always quantified. For many decision-makers, “just preventing an attack” isn’t a strong enough business case. They want to know: What is the return on investment (ROI)? How does this investment contribute to the bottom-line, reduce business risk, or improve operational performance?

9 Critical Questions to Ask When Choosing an MDR Provider

Managed Detection and Response (MDR) providers are indispensable to organizations seeking to bolster their cybersecurity posture. The proliferation of sophisticated attacks and the persistent shortage of skilled security professionals, outsourcing advanced threat detection, investigation, and response to a specialized MDR provider is a strategic move that cannot be overlooked. However, the market is flooded with vendors, each offering a unique blend of technology and human expertise.

ISO 27001 Risk Register Setup: Step-by-Step Guide

While we talk a lot on this site about the US Government’s various cybersecurity frameworks, like FedRAMP and CMMC, there’s one significant framework that deserves just as much attention: ISO 27001. ISO 27001, being an ISO standard, is an international framework for cybersecurity divorced from any one country’s government.