Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What You Need to Know about the Comcast Data Breach

Comcast is a global powerhouse as one of the foremost telecommunications and media conglomerates. It was established in 1963 as a small cable operator in Mississippi. Comcast’s mission focuses on connection through broadband television and film. Besides being the largest home internet service in the United States, it owns large media platforms like NBC-Universal and Universal Pictures.

Privileged Session Management (PSM): How It Strengthens Data Security

A single negligent click, command, or keystroke by a privileged user can let cybercriminals enter your network. This is where privileged session management (PSM) comes in. PSM enables you to monitor high-risk sessions and detect suspicious activity in real time, preventing insider and external threats from going unnoticed. In this article, we explain why PSM is critical in cybersecurity and how it can protect your sensitive data from threats.

PCI DSS 4.0.1 Checklist (2025): Automate 6.4.3 and 11.6.1

PCI DSS 4.0.1 became mandatory on March 31, 2025, bringing in 47 new requirements that fundamentally changed how compliance works. Organizations that treated PCI as an annual audit exercise now face a standard that expects real-time visibility into payment pages. Requirements 6.4.3 and 11.6.1 are the most impactful additions, which require real-time visibility into scripts and payment page changes. A spreadsheet updated quarterly can’t deliver that.

Weekly Cyber Security News 02/10/2025

Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! Ouch. Really ouch. Just a hop and a skip away: I suppose it is fair to point out that you need physical access to perform this. Hard, but not impossible: A win is a win.

Stripe OLT Achieves Microsoft Cloud Security Specialisation

Stripe OLT has achieved the Microsoft Cloud Security Specialisation, strengthening our position as one of the UK’s leading IT and Cyber Security providers. This certification – as well as our prior Microsoft Threat Protection Advanced Specialization certification – demonstrates our proven expertise in securing cloud environments with Microsoft’s advanced security tools.

Elevate Application Security from the Start with Static Analysis for Effective Risk Management

Securing your applications couldn’t be more important in today’s fast-moving world of software development. Organizations face mounting pressure to deliver innovative software at an accelerated pace, yet this speed must never compromise security. This is where DevSecOps becomes crucial. With threats constantly getting smarter, developers need effective tools to write secure code right from the start.

Zenity Joins the Microsoft Security Store: Securing AI Agents Everywhere, Together

We’re thrilled to share that Zenity is included in the unveiling of the Microsoft Security Store Partner Ecosystem. The Security Store is a new marketplace offering from Microsoft that brings together trusted, curated security solutions and AI agents to help organizations navigate the evolving landscape of cybersecurity in the age of AI. The Microsoft Security Store is a strategic leap forward in how security teams discover, deploy, and operationalize technologies that protect their environments.

Securing The Future: Cloudflare's Implementation of Post-Quantum Cryptography - Michiel Appelman

Explore how Cloudflare’s Post-Quantum Cryptography (PQC) capabilities are future-proofing enterprise security. Learn how we’re integrating PQC across our network to safeguard data against quantum threats, ensuring businesses stay protected in an evolving cryptographic landscape—without compromising performance or scalability.