Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

NIST Cybersecurity Framework (CSF) 2.0: A Complete Guide

The NIST Cybersecurity Framework (CSF) 2.0 is a voluntary framework developed by the National Institute of Standards and Technology (NIST) to help organizations manage and reduce cybersecurity risks. Initially released in 2014, CSF was primarily intended for critical infrastructure sectors. However, CSF 2.0 (2024) expands its scope to include organizations of all sizes and sectors, including small businesses, nonprofits, and large corporations.

HIPAA compliance for software development: A 7-step checklist

Any app collecting, processing, or storing protected health information (PHI) must be HIPAA-compliant to ensure ongoing operation without regulatory setbacks. This means that if your organization operates in the health tech industry, it must adhere to the requirements mandated by the regulation. ‍ Due to HIPAA’s broad scope and interpretative nature, the requirements may seem challenging without a clear compliance roadmap, leading to inefficient workflows and incomplete adherence to the rules.

The Akira ransomware exploit: Detecting IoT-based threats with Sumo Logic

In a recent and sophisticated cyberattack, the Akira ransomware group leveraged an unsecured Linux-based webcam to infiltrate a corporate network. By exploiting this overlooked IoT device, the attackers successfully bypassed traditional Endpoint Detection and Response (EDR) solutions, ultimately encrypting network shares and causing widespread damage.

How Calico Network Security Works

In the rapidly evolving world of Kubernetes, network security remains one of the most challenging aspects for organizations. The shift to dynamic containerized environments brings challenges like inter-cluster communication, rapid scaling, and multi-cloud deployments. These challenges, compounded by tool sprawl and fragmented visibility, leave teams grappling with operational inefficiencies, misaligned priorities, and increasing vulnerabilities.

Security Bulletin: Apache Camel Message Header Injection via Improper Filtering

In the days leading up to the publication of the Apache Camel Message Header Injection via Improper Filtering, now known as CVE-2025-27636, alarmist noise emerged from the wider cyber community, with Kevin Beaumont describing it as an “end of the world zero day” in Apache Camel, along with explicit details on how elements of this vulnerability worked.

The Traumatising Hurdles of Reporting Cyberstalking Incidents: Olivia's Story

In this case study, we walk through the journey of one of our service users and their family who were caught in a cyberstalking nightmare. From the initial report of stalking to the pursuit of justice, we follow their turbulent case marked by false allegations, manipulative tactics, and systemic obstacles.

Leveraging Retrospective Detection for Zero-Day Threats

Within the cybersecurity landscape, zero-day vulnerabilities have become a significant threat to companies, especially bigger enterprises. It is a form of cyberattack in which a security flaw that is undiscovered by the organization is exploited by attackers. Zero-day threats pose a serious challenge to enterprises as it becomes difficult to detect and mitigate an attack which is unknown.

AI Code Generation: Code Security & Quality, Benefits, Risks & Top Tools

AI code generation is exactly what it sounds like — using artificial intelligence to write and improve code. Tools powered by large language models (LLMs) and specialized AI systems can help developers generate boilerplate code, fix bugs, and even refactor entire sections of an application. And developers are leaning in. According to a GitHub survey, 92% of developers have already used AI coding tools at work or on personal projects.

DevSecOps Automation Framework

Security is often seen as a roadblock in development, slowing releases and adding friction between teams. However, as software development cycles become faster and more complex, security must evolve from a blocker to an innovation driver. DevSecOps ensures security is a core part of the development workflow, and automation plays a crucial role in making this integration smooth and effective.