Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Complying with the Cyber Resilience Act (CRA) using Aikido Security

TLDR: Aikido Security helps you to comply with the Cyber Resilience Act. We also help you to automate security policies and compliance checks for SOC2, ISO27001, CIS & NIS2. Here, we explain its importance of the Cyber Resilience Act and how Aikido helps you to comply with it.

Why I Couldn't Ignore the Need for ThreatSpike Black

Last October marked a turning point for ThreatSpike. Not only did we start the conversations around our Series A funding round. But also the mission expanded, not just to protect companies from cyber threats, but to give any business, of any size, access to IT and security at a standard most people assumed was only possible for global corporations.

GitProtect 2.0.5: More Access Control and Predictability

GitProtect 2.0.5 version focuses on a more predictable recovery and access control. The console now enforces 2FA when users enter through SSO or SAML. So, access to backup and restore actions requires a second factor at the point of use. Additionally, bulk restores no longer depend on a single token’s rate limit, and Jira jobs are less brittle as well, with automatic detection of expired Personal Access Tokens. The new version is not a redesign.

Tenant Matters: Enabling Safe SaaS Adoption with CASB Tenant Awareness

Imagine your marketing team needs to share a product roadmap with a partner, so they drop it into a shared OneDrive folder. Everything looks fine — same interface, same app — but no one realizes the file was uploaded to the partner’s personal OneDrive account instead of their corporate tenant. Days later, the file is still accessible from an unmanaged device, with no audit trail, no data loss protection, and no way to revoke access.

Intelligent threat detection for defence SOCs

Advanced AI-supported threat detection for faster MTTD and MTTR The Ministry of Defence (MoD)’s own assessments describe an unacceptable cyber risk position amid an escalating wave of malicious cyber activity1 — a sobering reality for defence security operations centre (SOC) managers With the risk of cyber attack among the highest managed by the Defence Board2, the pressure on security teams is growing. SOC teams must detect sophisticated cyber threats before they cause damage.

ENISA Will Operate the EU Cybersecurity Reserve. What This Means for Managed Security Service Providers

The European Union is building a new line of defense. On 26 August 2025, the European Commission and the EU Agency for Cybersecurity (ENISA) signed a contribution agreement that hands ENISA the keys to the EU Cybersecurity Reserve. The deal comes with funding: €36 million over three years. ENISA's mission is straightforward, if not simple. It will administer, operate, and monitor the bloc’s emergency cyber response capabilities.

Veracode Named a Leader in The Forrester Wave for SAST

Veracode is proud to announce our recognition as a Leader in The Forrester Wave: Static Application Security Testing (SAST) Solutions, Q3 2025. We believe this acknowledgment from a leading analyst firm reflects our relentless focus on innovation, customer success, and our vision for a secure, developer-first future. The Forrester Wave serves as an essential guide for technology buyers, and this report offers a comprehensive look at the 10 most significant SAST providers.