Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Breaking News

JumpCloud Acquires Stack Identity, Paving the Way for Identity-First Security

JumpCloud Inc. is continuing its identity-first momentum by acquiring Stack Identity. Stack Identity is a next-generation identity security and access visibility platform. This acquisition strengthens JumpCloud's identity-first access management solution.

DORA Non-Compliance Could Cost Your Business

Prompted by a new era of cyber-attacks surging downtime and data breaches, the Digital Operational Resilience Act (DORA) regulation came into force on the 17th of January to reshape how organisations approach security, privacy and cybersecurity. Cybercriminals are becoming increasingly daring and creative, with an expected rise in the exploitation of new vulnerabilities in 2025.

What Is Data Poisoning: Everything You Need To Know

Data poisoning is a type of attack targeting machine learning systems. It involves introducing false or misleading data into a training dataset. This can lead to flawed or malicious outputs from the model. Imagine a machine learning system trained to distinguish between cats and dogs. If poisoned data featuring mislabeled images is fed into it, the system could start making mistakes. It might misidentify a cat as a dog or vice versa.

Why Independent Security Testing Matters: Lessons from Cato SASE's Efficacy Evaluation

As adults, we rarely question the safety of the medicine we consume. This confidence stems from knowing that these products undergo rigorous, independent testing before reaching pharmacy shelves. Security solutions, especially those critical to enterprise operations, deserve the same level of scrutiny. Before trusting a platform to safeguard our data and systems, it’s essential to verify that it can counter the sophisticated threats we face today.

Achieving PSN Compliance: Why It Matters for Your Organisation

The PSN compliance certificate ensures organisations meet stringent security requirements, paving the way for improved operational integrity. Moreover, compliance can enhance organisational value, guiding strategic decisions and fostering a culture of accountability.

A Comprehensive Guide to Healthcare Cybersecurity

The healthcare industry faces a unique and urgent challenge in the ever-evolving world of cyber threats. As businesses across sectors fortify their digital defenses, healthcare stands out as a critical target due to its reliance on interconnected devices and vast repositories of sensitive patient data.

Modernize Your Directory Without Compromising Linux Security

In today’s threat landscape, you’re at risk if you don’t have all your identities—human and machine—secured with the right level of intelligent privilege controls. And the risk is even more significant when identities and privileges on your mission-critical Linux servers, especially those that run critical workloads or have sensitive data, are managed in silos, separately from the rest of the infrastructure.

Unmasking Shadow AI: What Is it and How Can You Manage it?

Since the launch of ChatGPT in late 2022, gen AI (generative artificial intelligence) has transformed nearly every facet of our lives, including our professions and workplace environments. Adoption has been driven by employees looking for faster, better ways to perform. For example, applications like ChatGPT, DALL-E, and Jasper are helping employees across industries boost productivity, overcome roadblocks, and brainstorm creative solutions.

Automating Browser Extension Security with LimaCharlie and Secure Annex

As browsers increasingly become users' primary operating systems for accessing analytics, financial, and other sensitive data, their security requirements are evolving. While browser developers invest significant resources in secure development, one vulnerability remains difficult to address: browser extensions. Browser companies must maintain extension flexibility to allow users to customize their web browsing experience.