Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Outsource Your DPO: Cut Compliance Costs by 70%

The General Data Protection Regulation (GDPR) and the UK’s Data Protection Act 2018 (DPA 18) have transformed how businesses must handle personal data. With fines of up to €20 million or 4% of global annual turnover for non-compliance, organisations cannot afford to take data protection lightly. The law‑firm DLA Piper reports that by January 2025 the total fines across Europe since GDPR came into force stood at €5.88 billion.

Digital Resilience for State and Local Governments (Part Two)

In the first part of our series, we examined the challenges facing state and local governments as they work to secure and maintain the availability of increasingly complex digital systems. Today, we turn our focus to how collaboration—powered by shared data platforms like Splunk—can enhance incident response and overall digital resilience.

Two Tools, One Strategy: Pairing Vulnerability Scanning and Pen Testing for Maximum Protection

Penetration Testing and Managed Vulnerability Scanning (MVS) are often mentioned in the same breath, yet their true value emerges when they are combined. Each plays a distinct role in building a strong Offensive Security program, and together they form a powerful foundation for reducing risk and improving resilience. However, it is common for those not fully immersed in cybersecurity practices to either confuse or conflate these two practices.

How Airties migrated from ArcSight to Elastic and cut investigation times from hours to seconds

In a rapidly evolving digital landscape, organizations must continuously adapt their security operations to keep pace with new threats and business needs. For the team at Airties, a global leader in Wi-Fi mesh technology and access point solutions, this meant rethinking their legacy security information and event management (SIEM) platform. Airties is a manufacturer of access points, primarily serving large telecom operators. Its solutions power the Wi-Fi networks in millions of homes worldwide.

Netwrix Innovation Week: ITDR Innovations - New Advances to Protect Against Identity Threats

Attackers are targeting Active Directory Certificate Services misconfigurations to impersonate admins. Netwrix is closing this gap with monitoring and blocking of suspicious certificate enrollments, easier access to security insights through MCP servers, and real-world validation via Bug Crowd. These innovations advance identity-first security and reduce organizational risk.

Half of Young People in the UK Cite Non-Consensual Deepfakes as a Top Fear

A new survey found that 50% of UK residents aged 16 to 34 cite deepfake nudes as their top worry related to AI technology, SecurityBrief reports. The survey, published by VerifyLabs, found that 35% of Brits across all age groups said sexualized deepfakes of themselves or their children were their top concern. “The study indicated that more than one in three respondents (36%) are also worried about the impact deepfakes could have on their family and friends,” SecurityBrief writes.

[Cybersecurity Awareness Month]: Keeping Enkryptor at Bay: How We All Can Help Beat Back Ransomware

Ransomware is the gift that keeps on giving… and taking. I’ve been tracking ransomware for almost nine years now, and I’ve seen it progress from simple and annoying malware to an organization-ending threat for many. I’m not big on pushing FUD (Fear, Uncertainty and Doubt), so when I say that it is one of the biggest cyberthreats to organizations in the small and medium-sized business space, I am not exaggerating.

CERT-In SBOM Guidelines 2025: What Fintech Companies Must Know

UPI fraud spiked 85% in FY 2024, reaching ₹1,087 crore. Most of it traced back to vulnerabilities in third-party APIs and unpatched components that fintechs didn’t know they were running. As such, in July 2025, CERT-In released SBOM Guidelines 2.0, making Software Bills of Materials mandatory for all government, public, and essential services orgs, while encouraging others to adopt it as best practice. For CTOs and CISOs, the message is direct.