Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

AI and security: It is complicated but doesn't need to be

AI is growing in popularity and this trend is only set to continue. This is supported by Gartner which states that approximately 80% of enterprises will have used generative artificial intelligence (GenAI) application programming interfaces (APIs) or models by 2026. However, AI is a broad and ubiquitous term, and, in many instances, it covers a range of technologies. Nevertheless, AI presents breakthroughs in the ability to process logic differently which is attracting attention from businesses and consumers alike who are experimenting with various forms of AI today. At the same time, this technology is attracting similar attention from threat actors who are realising that it could be a weakness in a company's security while it could also be a tool that helps companies to identify these weaknesses and address them.
Featured Post

Looking to 2024: Data, AI and security will be top priorities for businesses

The technology landscape has evolved significantly over the last year with the introduction of technologies such as ChatGPT and other generative AI tools taking the market by storm, while raising concerns about data security and more. As we move forward into 2024, we anticipate that the impact these new technologies have made this year means they will continue to pave the way forward, with AI remaining a hot topic in the industry, while data security concerns rise around it.

Unlocking the Power of Enterprise Data Security

By the year 2025, an estimated 463 exabytes will be created daily. For reference, one exabyte is 8,000,000,000,000,000,000 bits. That’s a lot of data. And even though cyber-attacks will increase as the attack surface expands, with cybercrime costing the world $10.5 trillion annually by 2025, data will remain the most valuable resource for today’s global enterprise.

Unlocking Compliance: Quebec's Law 25 and Data Privacy

In today’s data-driven world, privacy and data protection are paramount. One of the most significant developments in data privacy is Quebec’s Law 25, also known as Bill 64, which was officially adopted on September 22, 2021. This landmark legislation represents a significant step in modernizing Canada’s privacy landscape and introduces several key provisions that businesses must be prepared to address.

Collaboration: The Key Ingredient to Successful Security Compliance

In the fast-paced world of software development, the clash between developers and security experts could greatly benefit from some much-needed balance. On one side, developers strive for success based on metrics like delivery time, deployment frequency, and number of features. On the other side, security professionals are measured on vulnerability and compliance metrics.

Why Log4j Wasn't the Developers' Fault: Understanding the Challenges of Modern Developers

In today’s fast-paced digital world, software developers face many challenges as they work tirelessly to create and maintain applications that power our daily lives. The recent Log4Shell vulnerability, which exposed a critical flaw in the widely used Log4j library, has drawn widespread attention and criticism.

To the Left, To the Left

Shifting left, reminiscent of Beyoncė’s famous song, Irreplaceable, is not just a passing trend but a fundamental shift in how we approach software development and security. Historically, security has often been an afterthought — a box to check once the software’s built. However, this reactive approach has proven inadequate in today’s cybersecurity landscape.

Overcoming US Regulatory Compliance Challenges with Borderless Data

In today’s age of rapidly increasing data collection, data privacy laws are becoming more prevalent than ever. The EU’s General Data Protection Regulation (GDPR) is considered the worldwide benchmark of data privacy law. While many countries have followed similar regulations, the United States does not have a GDPR equivalent. Instead of national standards and regulations, individual states pass their own privacy laws.