Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The True Cost of Failure to Comply with NIS2

Cybersecurity regulations are constantly evolving to keep pace with emerging cybersecurity risks, and the Directive on Security of Network and Information Systems (NIS) is no exception. The introduction of NIS2 in December 2022 reshaped the compliance landscape across the EU, and organizations that don’t meet its requirements risk facing far more than just regulatory fines. The true cost of NIS2 non-compliance can be devastating, affecting not only finances but also business continuity and trust.

Frag explodes onto the scene - New DLS emerges for Frag ransomware

In 2024, Cyjax observed the emergence of 72 extortion and ransomware group data-leak sites (DLSs). As of late March 2025, Cyjax has identified DLSs for 21 new groups this year, as noted in recent blogs on Morpheus, GD LockerSec, Babuk2, Linkc, Anubis, and Arkana. The latest DLS Cyjax has identified is named Frag, which constitutes one of 14 new DLSs identified in March 2025 alone.

Future-Proofing Data Centers: Essential Cybersecurity Strategies

Data centers are the backbone of our digital economy, housing critical applications, customer data, and Cloud services. As we observe International Data Center Day, it's imperative to address the escalating cybersecurity challenges these facilities face. The rise of sophisticated cyber threats, including AI-driven attacks and supply chain vulnerabilities, necessitates a proactive and robust security posture.

New Styra DAS UI: Scale, Speed, and Simplicity in Authorization

The Enterprise OPA Platform is growing fast. With some organizations having hundreds of teams managing close to a thousand applications, we knew it was time for a major UI upgrade—on top of all the backend optimizations we make behind the scenes. Today, we’re excited to introduce the new Styra DAS UI, designed to help IAM engineers and application developers manage authorization at an unmatched scale.

Securing Canada's Digital Backbone: Navigating API Compliance

Canada's digital infrastructure relies heavily on APIs, facilitating a range of services from citizen interactions to vital government data exchanges. This interconnectedness, though revolutionary, brings forth intricate security challenges. Comprehending and complying with the Government of Canada's API standards is now imperative rather than optional. We will delve into these standards, the increasing threat landscape, and examine how solutions like Salt Security can protect your APIs.

Security Update: Publicly Exposed Ingress NGINX Admission

A series of vulnerabilities, known as IngressNightmare (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, CVE-2025-1974), have been identified in ingress-nginx, a widely used Kubernetes ingress controller. When exploited together, these vulnerabilities allow for configuration injection through the Validating Admission Controller.

Implementing Privileged Access Workstations: A Step-by-Step Guide

At a time when cyber threats seem to escalate daily, security teams are always on the lookout for new ways to protect their sensitive data and systems. For some, Privileged Access Workstations (PAWs) are being viewed as one solution to keep privileged accounts and critical systems safe from compromise. These are specialized workstations built for administrators and users who manage highly sensitive environments.

How to Build a Mature Vulnerability Management Program

The terms “patch management” and “vulnerability management“ are not the same. And that difference is a big difference. They may be confused because applying patches is one of the many ways to mitigate cyber risks. However, it is one piece of the entire vulnerability management puzzle and organizations that do not realize this are burdened with a false sense of security.