Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

A Phased Approach: Thoughts on EU AI Act Readiness

The European Union’s (EU) AI Act (the Act) represents landmark artificial intelligence (AI) regulation from the EU designed to promote trustworthy AI by focusing on the impacts on people through required mitigation of potential risks to health, safety and fundamental rights. The Act introduces a comprehensive and often complex framework for the development, deployment and use of AI systems, impacting a wide range of businesses across the globe.

Cyber and Physical Security Considerations for Returning to the Office

When remote work became mandatory in the wake of the 2020 COVID pandemic, organizations had to quickly dispatch staffers to their homes with all the equipment, and services, they would need to do their jobs. However, as organizations ranging from the US government to JP Morgan Chase to Amazon, have all put out a call for their workers to return to the office, security issues will again become paramount.

Privacy Enhancing Technologies (PETs): Data Protection Meets Innovation

The data protection law does not define PETs; however, The European Union Agency for Cybersecurity (ENISA) refers to PETs as: ‘software and hardware solutions, i.e. systems encompassing technical processes, methods or knowledge to achieve specific privacy or data protection functionality or to protect against risks of privacy of an individual or a group of natural persons.’1 In simple terms, they are strategies and tools designed at safeguarding privacy and empowering individuals.

Comprehensive PowerShell Commenting Guide

If you write Windows PowerShell scripts, it’s important to understand how to use PowerShell comments effectively. This article can help. It explains the key ways you can include comments in your scripts and provides guidance for when to use each method. It also explains popular use cases for comments and offers best practices to follow and common mistakes to avoid.

Introducing Workflows: Automate Security Alerting While Staying Focused on Real Risks

Security teams and developers are drowning in product security alerts. Every security scan generates a flood of issues, and manually reviewing, prioritizing, and assigning each one is time-consuming and inefficient. The result? Critical risks get buried in long backlogs, while developers waste time chasing issues that don’t actually introduce real risk.

Benefits of moving to SaaS IAM solutions

Once upon a time, ordering software would involve a physical delivery with a manual setup and availability on designated machines. The rise of cloud technology changed all that, with subscription-based SaaS growing 300% during 2012–2018. This shift in business model, from owning software to renting it, also meant a change in provisioning. Instead of relying on internal resources and expertise, organizations could simply tap into their external partners and providers.

Leveraging CloudCasa to Simplify Upgrades and Enhance Backup for Azure Local

As the Kubernetes ecosystem grows and evolves, the need for robust data protection and streamlined management in hybrid and edge environments has never been greater. Microsoft’s Azure Local platform has become a critical solution for deploying and managing Kubernetes, and in particular Azure Kubernetes Service (AKS), in these environments.

BDRCloud is Now Live - A Cloud-Hosted Backup Solution Built for MSPs to Maximize Profit Margins and Increase Recurring Revenue

We’re excited to announce the official launch of BDRCloud, a cloud-hosted backup and recovery platform designed exclusively for Managed Service Providers (MSPs). After a successful beta phase, BDRCloud is now production-ready, offering cost-effective, scalable, and secure backup solutions that empower MSPs to deliver profitable and reliable Backup-as-a-Service (BaaS). Here’s a quick look at what’s in-store with BDRCloud.