Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Loss Prevention and NIS2: how to plug DLP security gaps for NIS2 compliance

Data loss prevention (DLP) solutions, which kick in after data is stored, are insufficient for NIS2 compliance. Here’s how to plug the DLP security gap before data is stored. Does traditional data loss prevention (DLP) software help or hinder NIS2 compliance?

5 Cybersecurity Seeds to Plant for a Secure Tomorrow

Building strong cybersecurity doesn’t require fancy tools or a Hollywood-style war room. Often, it just takes the basics ‒ done really well. Think of it like gardening: healthy habits, applied consistently, create deep roots that protect your business when storms roll in. Here are five essential practices that every organization ‒ from small MSPs to midsize enterprises ‒ should plant today to ensure a secure tomorrow.

AI-driven CSPM: How GenAI will transform Cloud security posture management

Generative AI (GenAI) is poised to revolutionize the cloud security posture management (CSPM) space, bringing intelligence, automation, and context to increase the effectiveness of managing cloud risk. Maintaining a robust security posture in the cloud can be challenging as the number of deployed cloud services increases across diverse clouds. Soon, AI-driven CSPM will play a critical role in helping security and cloud teams to keep pace with misconfigurations and compliance gaps.

Proxy Servers: How Proxies Work, Common Types, Uses & More

Are you worried about your privacy online? You're not alone. In one U.S. survey, three out of every four respondents expressed growing concerns about their data privacy. In the past five years, the vast majority of businesses and organizations have been victim to cyberattacks, and the average cost of data breaches has increased by $137,000.

Xona and Oregon Systems Partner to Deliver Secure, Effortless, and Reliable OT Access in the Middle East

Xona, the leading provider of secure access solutions for critical infrastructure, is excited to announce a strategic partnership with Oregon Systems, a premier cybersecurity value added distributor specializing in Operational Technology (OT), Critical Infrastructure Security and providing High performance computing (HPC) solutions in the Middle East.

Cato CTRL Threat Research: OpenAI's ChatGPT Image Generator Enables Creation of Fake Passports

On March 25, OpenAI introduced image generation for ChatGPT-4o and ChatGPT-4o mini. On March 31, it was announced that the tool was available for free to all users. Since then, users have quickly discovered that ChatGPT’s image generator can be manipulated to create fake receipts and forge other documents.

Wallarm Research Releases Nuclei Template to Counter Threats Targeting LLM Apps

Wallarm Research has just released a powerful new Nuclei template targeting a new kind of exposure: the Model Context Protocol (MCP). This isn’t about legacy devtools or generic JSON-RPC pinging. It’s about the protocol fueling next-gen LLM applications — and it’s already showing up exposed in the wild.