Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Vanta uses Okta for identity and access management

In this series, you’ll hear directly from Vanta’s own Security, Enterprise Engineering, and Privacy, Risk, & Compliance Teams to learn about the team’s approach to keeping Vanta secure. We’ll also share some guidance for teams of all sizes — whether you’re just getting started or looking to uplevel your operations.

Maximize Productivity, Performance, and Security: Unleashing the Power of Netskope and Zoom

Zoom is firmly a part of everyday work. The modern workspace is no longer a corporate office—it’s anywhere an employee accesses corporate data and applications. With the widespread adoption of hybrid work, there has been a hard shift towards communication platforms like Zoom that allow you to connect, share ideas, and get projects done together in real time, regardless of your physical location.

Can machines dream of secure code? From AI hallucinations to software vulnerabilities

As GenerativeAI expands its reach, the impact of software development is not left behind. Generative models — particularly Language Models (LMs), such as GPT-3, and those falling under the umbrella of Large Language Models (LLMs) — are increasingly adept at creating human-like text. This includes writing code.

The Blurred Lines Between Payment Fraud and Cybercrime: Implementing Robust Security Solutions to Stay Safe Online

Once upon a time, there was a small business owner named Alice, who fought to keep her retail establishment afloat amid the stormy seas of a global pandemic. Like many other merchants, she embraced the digital revolution and moved her store online. This allowed her to reach more customers and keep her business buoyant. Her store, Alice’s Wonderland, offered a vibrant range of local handicrafts that started garnering attention on social media. It was a tale of small business success.

Coffee Talk with SURGe: The Interview Series featuring Jake Williams

Join Audra Streetman and special guest Jake Williams (@MalwareJake) for a discussion about hiring in cybersecurity, interview advice, the challenges associated with vulnerability prioritization, Microsoft's Storm-0558 report, and Jake's take on the future of AI and LLMs in cybersecurity.

Thousands Impacted By PA Child Care Works Breach

The Pennsylvania Child Care Works program helps low-income families pay for their childcare costs. The program offers a portion of the childcare payment amount, and the families pay the rest. This system helps citizens throughout Pennsylvania get access to quality childcare. To qualify to use the system, applicants must fill out paperwork containing personal and financial information. This data is used to verify that they meet all the requirements of the program.

The Effects On Cybersecurity & Infosec of Economic Downturns

Welcome to this episode of the Razorwire podcast, where my guest, renowned cyber security expert Oliver Rochford, and I explore the impact of economic downturns on the cybersecurity industry and how it affects professionals in the field. We discuss the current economic climate and the challenges it poses for the industry, with inflation on the rise and smaller banks struggling to keep up. We also examine the effects of previous economic downturns and how they impacted the industry along with what we should have learned from it.