Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

3 Things You Need to Know About the Okta Breach

In a recent security breach, a threat actor with stolen credentials was able to access Okta’s support case management system. That support case management system contained several HAR files, or HTTP Archive files, in support tickets. A HAR file is a JSON-based file format that records and stores detailed information about the interactions between a web browser and a website.

Detecting Malicious Activity in Microsoft 365

Microsoft 365 is a prime target for adversaries, with objectives ranging from credential harvesting to ransomware. However, managing detection rules can be a cumbersome task, especially as security analysts try to keep up with the ever-changing landscape of telemetry options from Microsoft.

Introducing Cyber Essentials and Essential Eight: Putting customers first globally

Just a little over a year ago, Vanta went global with the opening of a European headquarters in Dublin as well as an office in Sydney. And over the past several quarters, we’ve accelerated international momentum by scaling investments across the product and business, from opening our EU data centre to rolling out localised product capabilities, in-region technical support, and more.

[Webinar] Increase visibility and federal IT network security with Tanium + ServiceNow

In the U.S. Federal Government, too often the superset of assets that need to be managed across an entire department or agency aren’t well understood. Many of the latest executive orders, binding operational directives, and even the most recent White House Cybersecurity Strategy all point to a foundational piece of reducing your attack surface: having an accurate inventory of your assets.

New DarkGate Variant Uses a New Loading Approach

In the past month, the Netskope Threat Labs team observed a considerable increase of SharePoint usage to deliver malware caused by an attack campaign abusing Microsoft Teams and SharePoint to deliver a malware named DarkGate. DarkGate (also known as MehCrypter) is a malware that was first reported by enSilo (now Fortinet) in 2018 and has been used in multiple campaigns in the past months.

How Executive Order on Artificial Intelligence Addresses Cybersecurity Risk

Unlike in the 1800s when a safety brake increased the public’s acceptance of elevators, artificial intelligence (AI) was accepted by the public much before guardrails came to be. “ChatGPT had 1 million users within the first five days of being available,” shares Forbes.

PCI 4.0: What is coming, and what do you need to do about it?

PCI DSS 4.0 is coming, and getting your organization up to speed will be no small task. Don't wait until the last minute. Hear Payment Card Industry (PCI) Qualified Security Assessors Brian Dean and Joe Moser as they explain the key differences between PCI 4.0 and PCI 3.2.1, what to expect with the new release, and which steps you need to take right away to prepare.

The Evolving Role of the CISO and the Language of Resilience with Marene Allison

In this episode of Cyber Security Decoded, Steve Stone, Head of Rubrik Zero Labs, is joined by a former CISO at Johnson & Johnson to discuss the ever-evolving role of the CISO. They discuss what she has learned from the biggest threat intrusions in her career, how the role of the CISO is evolving to adapt to new cyber threats, and what we can tactically do to empower more professionals from different backgrounds to pursue a career in cybersecurity.