Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Are The IRS 1075 Safeguards Audit Requirements?

When you think about an IRS publication, you’re probably thinking about the complex forms you need to fill out, usually relating to taxes. That’s not all the IRS publishes, though, and one of the more important documents they maintain is called Publication 1075. When it comes to sensitive information for everyday Americans and private sector businesses, there’s very little more important and more sensitive than tax information.

The Automated Con: Mitigation Tactics for Identifying Deepfake and LLM-Assisted Impersonation

Over the past few years, artificial intelligence (AI) has supercharged deepfake technology. Creating a fake picture, video, or audio recording of a person used to require a considerable investment of both time and technical skills. Now, generative AI (genAI) platforms can whip up convincing deepfakes in minutes, using only a single photo or short voice clip as a starting point.

Egnyte Joins Anthropic to Bring Secure, Responsible AI to Financial Services

Egnyte is proud to partner with Anthropic in the next phase of Claude for Financial Services—making it easier than ever for sales, investment, and compliance teams to bring their content, context, and institutional knowledge directly to Claude with governed, secure access. As financial institutions race to unlock insights from decades of documents, models, and market data, the challenge has never been simply access.

Simplify log collection and aggregation for MSSPs with Datadog Observability Pipelines

Managed security service providers (MSSPs) deliver 24/7 monitoring and incident response for hundreds of customers across large, hybrid environments. As they add more customers and ingest more logs, MSSPs face mounting difficulties in collecting and processing that data before routing it to downstream security tools. Doing this reliably at petabyte scale while accounting for complex, customer-specific taxonomy and compliance requirements is a major challenge.

HIPAA Breach Notification Rule: Meeting the 60-Day Timeline for Website PHI Exposure

Earlier, the anatomy of a HIPAA breach felt tangible. The threat landscape was shaped by risks you could point to, such as physical theft, phishing, or simple human error. Now, some of the biggest risks live in your website and run quietly in the background. Third-party scripts, tracking pixels, and analytics tags can collect or transmit PHI to external parties while looking like routine marketing infrastructure.

2025 Compliance Changes Review - What Organizations Must Know

The regulatory and compliance landscape evolved rapidly in 2025, with changes key changes affecting cybersecurity, privacy, and protective security. This review breaks down key compliance changes, offering insights into new requirements and how to ensure compliance in 2026.

Astro is joining Cloudflare

The Astro Technology Company, creators of the Astro web framework, is joining Cloudflare. Astro is the web framework for building fast, content-driven websites. Over the past few years, we’ve seen an incredibly diverse range of developers and companies use Astro to build for the web. This ranges from established brands like Porsche and IKEA, to fast-growing AI companies like Opencode and OpenAI.

Rondodox Botnet: Understanding a Low-Visibility Cyber Threat

Rondodox is a botnet that operates quietly and causes damage over time. It does not flood networks with traffic or trigger obvious alerts. It continues to run in the background for extended periods without being detected. In most cases, botnets are found when something breaks, but Rondodox is different. It blends into normal activity and relies on low-noise communication. This is why detecting this botnet is difficult, even in environments with mature security tools.

Five things successful IT teams get right about SaaS management

It’s easy to see how SaaS sprawl happens if you picture the moment it starts. A team is blocked, someone needs a tool ASAP, and the answer to their problems lies just behind a free trial, so they sign up for a new tool. No one is being careless. They’re being efficient. The problem is that follow-up rarely keeps pace with new sign-ups, especially when the card on file belongs to "the company" and the requester has already moved on to the next priority.