Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Malware as a Service (MaaS): The New Frontier of Cybercrime

Cybercrime has rapidly evolved, and one of the most dangerous models that has emerged in recent years is malware as a service (MaaS). This criminal business model allows anyone without advanced programming knowledge to deploy highly effective malware campaigns by paying a subscription or a one-time fee. MaaS democratizes access to malicious tools and amplifies both the quantity and sophistication of cyberattacks.

Empowering Data Security in GenAI: Step-by-Step Guide to PII Safeguarding in Bedrock using Protegrity

Generative AI (GenAI) applications, especially through Retrieval-Augmented Generation (RAG) pipelines, are transforming business interactions with data. These pipelines leverage language models and extensive enterprise knowledge bases for real-time queries of large internal datasets. Robust data privacy and security solutions are essential. Amazon Bedrock’s native security guardrails address this need.

FINMA Compliance: DevSecOps Strategies for Securing the Swiss Financial Ecosystem

The Swiss Financial Market Supervisory Authority (FINMA) sets strict requirements to ensure that financial institutions operating in Switzerland maintain robust security and operational resilience. FINMA’s guidelines are crucial for protecting sensitive financial data, minimizing risks, and maintaining trust in the Swiss financial ecosystem. As part of that, software supply chain security plays an essential role in meeting these compliance requirements.

How Elastic can help organizations achieve CMMC compliance

The Cybersecurity Maturity Model Certification (CMMC) is a framework established by the US Department of Defense (DoD) to ensure that organizations handling Controlled Unclassified Information (CUI) implement robust cybersecurity measures. As CMMC becomes a key requirement for defense contractors, higher education institutions engaged in research or contracts with the DoD must also comply with its standards.

UK Cracks Down on AI-Generated Child Abuse Content

As AI tools grow more sophisticated and accessible, sadly exploitation of these tools also increases. Recognising this, the Home Office has made the UK the first country in the world to introduce new legislation that targets predators producing AI-generated child sexual abuse material (CSAM). AI-generated content has severe consequences for victims. CSAMs may be used to manipulate or blackmail children, perpetuate harmful narratives, or retraumatise victims whose likenesses have been altered.

Key Steps to Achieving XDR Maturity with Microsoft (+ Free Self-Assessment Tool)

Organizations are under constant pressure to ensure that their security defenses adapt effectively to evolving threat actor methodologies. Extended detection and response (XDR) has the potential to significantly advance these efforts thanks to its ability to accelerate and streamline investigation, threat hunting and response. However, successfully adopting XDR to achieve comprehensive visibility demands some important considerations.

Xona and OTconnect Partner to Deliver Secure, Effortless, and Reliable OT Access

Xona, the leading provider of secure access solutions for critical infrastructure, is proud to announce a strategic partnership with OTconnect, a cybersecurity leader specializing in securing Industrial Control Systems. This collaboration brings together Xona’s cutting-edge secure access management platform with OTconnect’s hands-on cybersecurity expertise to deliver a fully managed, scalable remote access solution tailored for critical OT environments.

Stay Ahead of Kubernetes Security: ARMO Platform Now Supports CIS Kubernetes Benchmark v1.10

Kubernetes security is an evolving challenge, and staying compliant with industry best practices is crucial. That’s why we’re excited to announce that ARMO now supports the latest CIS Kubernetes Benchmark v1.10! Get your Kubernetes Security Checklist now.

It's Time to Break Up with Spreadsheets for Managing Vulnerabilities

Let’s be real—spreadsheets have been the go-to tool for vulnerability management for years. They’re easy to set up, familiar, and flexible. But here’s the hard truth: they’re costing you time, accuracy, and security. Imagine trying to track thousands of vulnerabilities across an ever-changing attack surface using a tool designed for budgeting, not security.

Clinic Safety: How Technology is Changing Patient Care

Safety within the clinic has never been more crucial, and technology is transforming the way healthcare professionals protect patients' safety. From the protection of confidential patient data to new areas of telemedicine, healthcare IT innovations are transforming the industry.