Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Detect human names in logs with ML in Sensitive Data Scanner

Modern applications generate a constant stream of logs, some of which carry more information than they should. For too many organizations, logs include personally identifiable information (PII) such as customer names that were never meant to leave production systems. Teams try to limit this data exposure by using regular expressions to detect and obfuscate matches, only to discover that names like John O’Connor, Mary-Jane, Jane van der Meer, and A. García slip through.

Staying PCI DSS Compliant: The Annual Checklist

Payment Card Industry Data Security Standard (PCI DSS) compliance isn’t a once-a-year exercise; it’s a year-round effort that requires regular validation to protect cardholder data, manage risk, and maintain audit readiness throughout the year. Compliance failures are rarely caused by a single missing control.

Entity Detection Plus Protection: Nightfall's New Approach to Comprehensive DLP

For years, data loss prevention has meant one thing: finding sensitive entities. Social Security numbers, credit card numbers, API keys—if you could pattern-match it, you could protect it. But this approach has always had fundamental limits. What happens when you need to protect customer IDs unique to your business? What about proprietary source code that doesn't contain any traditional PII?

The CISA ChatGPT Incident Makes the Case for AI-Native DLP

The acting director of America's Cybersecurity and Infrastructure Security Agency—the person tasked with defending federal networks against nation-state adversaries—triggered multiple automated security warnings by uploading sensitive government documents to ChatGPT. If this happened at CISA, it can happen at your organization too.

What does a virtual CISO (vCISO) actually do?

A virtual CISO is your on-demand cybersecurity resource. We provide the same strategic leadership as an in-house CISO, without the full-time commitment. vCISOs are used by organisations that need experienced security leadership to meet their compliance requirements, manage cyber risk, and guide security decisions, but don’t yet have a permanent CISO, or may have an interim requirement for a vCISO.

Manic Monday: A Day in the Life of Threat Hunting

John, a Cyber Threat Intelligence (CTI) analyst, turns to look at his CISO. He seems a bit rattled. John responds, “Yeah. Huge story.” “Massive. The board is worried and wants to know if this puts us at risk. We’re secure, right?” John hesitates.“Let me get back to you on that.” The CISO walks away. John races to his desk.

How to Compare Cloud Security Tools: The Evaluation Framework

You’re not struggling to find cloud security tools. You’re struggling to compare them meaningfully. Every vendor claims “comprehensive coverage” and “real-time detection.” Their feature matrices look identical. Their demos all show impressive dashboards catching simulated attacks.

Best eBPF Solutions for Security: A Practitioner's Guide to Runtime Protection

What is the best eBPF security tool for Kubernetes? For detection-only, Falco. For detection plus enforcement, Tetragon or KubeArmor. For full-stack correlation across cloud, Kubernetes, container, and application layers, ARMO CADR. The right choice depends on whether you need basic visibility, policy enforcement, or complete attack story generation that reduces investigation time by 90%+. Why do most eBPF security tools fail teams? They create more alerts, not better understanding.

The Art of the Invisible Key: Passkey Global Breakthrough

Passkeys now protects billions of accounts, redefining how the world signs in through stronger, more secure authentication without a password. Yet this global movement runs deeper than most realize. While passkeys implements thoroughly scrutinized standards developed by the FIDO Alliance in collaboration with the W3C, global adoption, however, is driven by a central layer that extends beyond the open standards, one that remains little-researched, varies by implementation, and it is often misunderstood.