Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

TEFCA compliance for digital health companies: a guide to identity proofing

In 1996, the US signed the Health Insurance Portability and Accountability Act (HIPAA) into law. One of the government’s chief goals was to safeguard sensitive patient data and protected health information (PHI) from unauthorized disclosure. While these protections were critical, HIPAA compliance requirements (alongside an already-fragmented electronic health record systems) have led to ongoing data silos across healthcare.

What You Need to Know about the BWH Hotels Data Breach

BWH Hotel Group is one of the world's largest hotel networks, operating more than 4,000 hotels in over 100 countries. The company evolved from Best Western and today manages a multi-brand portfolio spanning budget to luxury hospitality. BWH Hotels' portfolio includes prominent brands such as Best Western Hotels & Resorts, WorldHotels, and Sure Hotels, serving millions of guests annually across approximately 4,300 hotels that generate more than $8.5 billion in annual revenue.

Your Browser Is Leaking More of Your Company's Data Than You Think

In this video, you will learn why agentic browsers like ChatGPT Atlas, Perplexity Comet, and Arc have turned the browser into a double agent inside your enterprise, how shadow adoption is bypassing MDM and endpoint controls in days, and why indirect prompt injection creates an attack surface your file-based DLP cannot see. You will also learn how data lineage replaces noisy content inspection with origin-and-destination tracking, so you can stop the leak without blocking the tools your business depends on.

Six MCP Security Incidents Every Security Leader Should Know

In July 2025, an AI agent reviewed a support ticket, queried a production database, and leaked integration tokens directly to the attacker watching the thread. Months earlier, another AI followed "hidden instructions" in a public repository, exfiltrating private code into a visible pull request. In both cases, the AI wasn't broken; it simply obeyed the attacker instead of the developer.

Data quality defines a ceiling for SOC performance

Defenders have long known that richer evidence improves security outcomes by enabling faster triage, deeper analysis, and more complete investigation. Although Corelight was founded on this premise, it’s been hard for us to quantify the impact of better network data - until now. Recently, we built an agentic test harness to measure the success of frontier LLMs in responding to real-world attack scenarios, using a range of source data.

The Rise of Cyber Threats and AI in the Philippines: A New Era Beyond Legacy Security

The Philippines, like many other nations, is witnessing a dramatic increase in cyber threats, fueled by the rapid adoption of digital technologies and the proliferation of sophisticated cybercriminals. This article examines the evolution of cyber threats in the Philippines, with a focus on phishing, email security and the risks posed by agentic AI.

Navigating the Cybersecurity Landscape in India Empowering Human and AI Agents

The Asia-Pacific and Japan (APJ) region, with its dynamic economic growth and technological advancements, presents unique challenges and opportunities in the realm of human risk management and agentic risk management, particularly within the financial services sector. As financial institutions strive to protect themselves from increasing cyber threats, they must align their security practices with the regulations set forth by central banks across the countries.

Auditor drop-in

Who invited Brandon?! No one needs an unannounced drop-in right before audit day. But don't worry…if your auditors do pop by, Vanta has you covered. Removing manual work. Continuously monitoring your controls. Ensuring you're always audit-ready. According to IDC, companies using Vanta spend 82% less staff time per framework and attestation-related audit, so those pre-audit scaries? Totally optional.

BDRShield v9.1.0: Faster, safer backups for virtual, endpoint, and DR workflows

BDRShield v9.1.0, released o May 6, 2026, brings practical improvements that speed backups, strengthen recover-ability, and give admins clearer visibility—especially for distributed sites, and MSP operations. This update focuses on...