Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Antagonistic Harmony: Permissioned and Permissionless Blockchains in Tomorrow's Financial System

The rise of blockchain has fundamentally reshaped the financial ecosystem. Since Bitcoin’s genesis in 2009, permissionless blockchains have introduced an open, decentralized model for transacting value—fueling everything from DeFi to NFTs. Meanwhile, traditional financial institutions (FIs), drawn to the benefits of blockchain yet cautious of its risks, have leaned into permissioned systems that offer control, privacy, and compliance.

ISO 42001:2023 Certification for Ethical AI Governance

ISO 42001 takes a risk-based approach and structure like other ISO standards and covers: with a focus on AI governance. Under the Annex A, it provides a list of controls, used to manage AI risks and ensure responsible deployment of AI systems. Under Annex B, it explains how to implement these controls, giving organisations the flexibility to adapt them based on their specific needs.

What is attestation and why is it important?

Managing an enterprise-level Active Directory (AD) means enterprise-grade volumes of identity accounts. Naturally, operations at this scale come with high complexity and call for intensive resources to maintain control. Manual errors can creep in as the business expands, leading to increased cybersecurity risks and vulnerabilities.

Egnyte on AWS Marketplace: Improve Your Procurement Efficiency

Starting today, Egnyte is available through the AWS Marketplace! Our partnership with AWS makes it easier to streamline procurement processes and maximize your technology investments. Read on to discover how our collaboration with AWS simplifies the integration of Egnyte into your existing tech stack, helping you unlock more value from your investment.

DORA and NIS 2: Importance and key differences explained

The Digital Operational Resilience Act (DORA) and the Revised Network and Information Systems (NIS 2) are two of the latest EU cybersecurity regulations designed to fortify the security posture and cyber resilience of in-scope entities. ‍ Both regulations share the same general purpose of increasing their respective sectors' overall transparency and security. Still, their approaches to this goal vary in several key aspects you’ll learn about in this guide.

Sysdig and Google SecOps: Unifying cloud security for SOC teams

In our first blog post, “Sysdig Secure-Google Chronicle integration – Why, what, and how“, we introduced the idea of connecting both platforms, highlighting their complementary strengths and providing a high-level overview. Now, we’re taking it a step further—moving beyond theory to focus on practical, real-world applications.

Securing Endpoints with MITRE ATT&CK: From Theory to Practice

MITRE ATT&CK has become the go-to knowledge base for understanding how attackers operate since 2013. The framework’s 12 tactical categories map out attack stages from original access to final impact. Security teams can spot and block threats at multiple points before any damage occurs. This piece shows how companies can utilize MITRE ATT&CK’s framework to boost their EDR.

The API Security Challenge in AI: Preventing Resource Exhaustion and Unauthorized Access

Agentic AI is transforming business. Organizations are increasingly integrating AI agents into core business systems and processes, using them as intermediaries between users and these internal systems. As a result, these organizations are improving efficiency, automating routine tasks, and driving innovation. But these benefits come at a cost. AI agents rely on APIs to access data and functionality from underlying systems. Without APIs, AI agents are useless.

Evolution Equity Partners' Portfolio Companies Tackle a Cyber Crisis

Patrick Orzechowski (also known as “PO”) is Torq’s Field CISO, bringing his years of experience and expertise as a SOC leader to our customers. PO is a seasoned security veteran with a deep understanding of the modern security landscape. You can find him talking to SOC leaders and CISOs from major brands at cybersecurity events around the world.

Introduction to the Australian Privacy Principles

The Privacy Act 1988 establishes the Australian Privacy Principles (APPs) as the foundation of privacy regulation in Australia. These 13 principles guide how organizations must handle, use, and manage personal information. The APPs apply to most Australian Government agencies, private organizations earning over $3 million annually, and certain smaller businesses—collectively called APP entities. For organizations doing business in Australia, APP compliance goes beyond avoiding penalties.