Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

DORA Non-Compliance Could Cost Your Business

Prompted by a new era of cyber-attacks surging downtime and data breaches, the Digital Operational Resilience Act (DORA) regulation came into force on the 17th of January to reshape how organisations approach security, privacy and cybersecurity. Cybercriminals are becoming increasingly daring and creative, with an expected rise in the exploitation of new vulnerabilities in 2025.

JumpCloud Acquires Stack Identity, Paving the Way for Identity-First Security

JumpCloud Inc. is continuing its identity-first momentum by acquiring Stack Identity. Stack Identity is a next-generation identity security and access visibility platform. This acquisition strengthens JumpCloud's identity-first access management solution.

The Life of Pi - Privacy Leaders and Their Everyday

In today’s data-driven economy, enterprises are under increasing pressure to manage privacy risks effectively. The responsibility of identifying and mitigating these risks often falls on lawyers and Chief Data Privacy Officers (CDPOs), who must navigate complex regulatory landscapes, safeguard sensitive data, and ensure their organizations maintain customer trust.

Breaking Down Signature-Based Detection: A Practical Guide

Nearly 90% of cyberattacks are known methods that proper systems can detect, but most organizations don’t have the best defenses. Signature-based detection is a vital aspect of cybersecurity. It offers some benefits but also has some drawbacks. This blog will break it down simply to help you strengthen your defenses against new threats.

Active Directory Incident Response: Key Things to Keep in Mind

Active Directory (AD) is crucial for network security as it controls access to sensitive data, making it a primary target for attackers. Even a small AD breach can result in significant data loss, operational downtime, and reputational damage in a business.

Automating Browser Extension Security with LimaCharlie and Secure Annex

As browsers increasingly become users' primary operating systems for accessing analytics, financial, and other sensitive data, their security requirements are evolving. While browser developers invest significant resources in secure development, one vulnerability remains difficult to address: browser extensions. Browser companies must maintain extension flexibility to allow users to customize their web browsing experience.

Modernize Your Directory Without Compromising Linux Security

In today’s threat landscape, you’re at risk if you don’t have all your identities—human and machine—secured with the right level of intelligent privilege controls. And the risk is even more significant when identities and privileges on your mission-critical Linux servers, especially those that run critical workloads or have sensitive data, are managed in silos, separately from the rest of the infrastructure.

Why Independent Security Testing Matters: Lessons from Cato SASE's Efficacy Evaluation

As adults, we rarely question the safety of the medicine we consume. This confidence stems from knowing that these products undergo rigorous, independent testing before reaching pharmacy shelves. Security solutions, especially those critical to enterprise operations, deserve the same level of scrutiny. Before trusting a platform to safeguard our data and systems, it’s essential to verify that it can counter the sophisticated threats we face today.

API Security Is At the Center of OpenAI vs. DeepSeek Allegations

With a high-stakes battle between OpenAI and its alleged Chinese rival, DeepSeek, API security was catapulted to priority number one in the AI community today. According to multiple reports, OpenAI and Microsoft have been investigating whether DeepSeek improperly used OpenAI’s API to train its own AI models.