Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ISO 27001: Nonconformity & Opportunity for Improvement

A key part of any security framework, from FedRAMP to ISO 27001, is enforcement. Putting out a set of standards is only as effective as the ability to penalize failure to comply. Within the ISO ecosystem, compliance is validated through the use of external audits. The auditors will evaluate your organization based on both ISO standards and other external factors, like regulatory requirements within your industry.

11 Third-Party Vendor Privileged Access Best Practices

Third-party vendors are an essential part of modern enterprise operations, providing critical services such as infrastructure maintenance, application support, system integrations, and managed IT services. To perform these tasks, vendors often require remote access to internal systems, frequently with elevated privileges. While this access enables operational efficiency, it also introduces significant security risks if not managed properly.

Top 6 Takeaways from the 2025 KuppingerCole Leadership Compass for Secure Remote Access in OT/ICS

Secure remote access (SRA) is no longer a stopgap or an IT workaround; it’s become foundational to industrial cybersecurity. According to KuppingerCole, demand for SRA in OT and ICS environments is accelerating due to the convergence of IT and OT networks, rising cyber threats, and mounting regulatory pressure. Traditionally, remote access in industrial environments was limited, heavily manual, and often avoided due to risk.

From Zero Trust to SPIFFE: How to Secure Microservices with Istio and Teleport

This guide walks through how to deploy microservices with Zero Trust using SPIFFE identities, service mesh mTLS, and short-lived certificates. You’ll learn how to deploy a secure microservices application, configure default-deny authorization policies, and rebuild service connectivity with explicit SPIFFE-based allow rules.

Partner-level vulnerability assessment and patch management for MSPs in Acronis RMM

For MSPs, vulnerability assessment and patch management are challenging primarily because of scale. Every new customer adds another tenant to configure, monitor and maintain, which multiplies operational overhead and increases the risk of inconsistency. The newly released cross-tenant, partner-level vulnerability assessment and patch management in Acronis RMM is designed to break this pattern.

What is Slopsquatting? The AI Package Hallucination Attack Already Happening

Typosquatting, registering a typoed version of a popular package and waiting for a developer to accidentally type and install the wrong package, has been around for a decade in npm. It’s nothing new— the registry has protections for it. Then AI came along and changed everything again. Slopsquatting is the new, AI flavor of typosquatting. Instead of betting on human typos, attackers bet on AI hallucinations, the package names that LLMs confidently recommend that don't actually exist.

Replacing Password Sharing in Slack With Secure Access Workflows

Many teams share credentials in Slack out of convenience, but this seemingly harmless habit introduces serious security and compliance risks. From accidental exposure to unauthorized access, sharing passwords in Slack can create major vulnerabilities across your organization. Keeper’s Slack workflow replaces risky password sharing in Slack with secure, Just-in-Time (JIT) access requests and approvals.

Ask These 9 Questions When Evaluating an MDR Provider

Managed Detection and Response (MDR) providers are indispensable to organizations seeking to bolster their cybersecurity posture, but it’s important to know what questions to ask during the search process. Here are nine essential questions and follow up inquiries to ask when assessing an MDR vendor to ensure the right fit for your organization.

The Mobile AppSec Evaluation Guide for Security Leaders

Mobile security feels mature. Enterprises scan frequently, track findings, and report posture upward. Yet under regulatory scrutiny, cracks appear. This gap between perceived security and defensible governance is where mobile AppSec quietly fails. The illusion isn’t that security isn’t happening. It’s that it isn’t aligned with how regulated risk actually operates.