Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

DORA Non-Compliance Could Cost Your Business

Prompted by a new era of cyber-attacks surging downtime and data breaches, the Digital Operational Resilience Act (DORA) regulation came into force on the 17th of January to reshape how organisations approach security, privacy and cybersecurity. Cybercriminals are becoming increasingly daring and creative, with an expected rise in the exploitation of new vulnerabilities in 2025.

JumpCloud Acquires Stack Identity, Paving the Way for Identity-First Security

JumpCloud Inc. is continuing its identity-first momentum by acquiring Stack Identity. Stack Identity is a next-generation identity security and access visibility platform. This acquisition strengthens JumpCloud's identity-first access management solution.

The Tines Lookback - a product recap of this past quarter (January 2025)

Here at Tines, we’re always looking for ways to continue enhancing how you build, run, and monitor your most important workflows. We asked a few of our Engineers, Designers, and Product Managers to hop on and show us their favorite features of the last few months. They covered topics such as: Visual updates to the change control review modal (00:24) New ways to build with conditional page elements (4:16) Working with arrays using the LOOP option (6:58) Using your preferred AI provider (10:26) Cases for mobile (13:16)

TechShifts: Frank Brockners on IT Troubleshooting with Agentic AI

Despite many technical advancements, IT troubleshooting is still a largely manual task. Why is that? Outshift’s Frank Brockners, a Cisco Distinguished Engineer, walks us through the latest and how agentic AI is set to complement the traditional methods of IT troubleshooting to resolve these issues more efficiently. Want to learn more? Meet Frank at Cisco Live Amsterdam Feb. 9-14, 2025 where he will have four sessions exploring the intricacies of agentic systems, from pre- and post-deployment planning to troubleshooting and change management.

The Life of Pi - Privacy Leaders and Their Everyday

In today’s data-driven economy, enterprises are under increasing pressure to manage privacy risks effectively. The responsibility of identifying and mitigating these risks often falls on lawyers and Chief Data Privacy Officers (CDPOs), who must navigate complex regulatory landscapes, safeguard sensitive data, and ensure their organizations maintain customer trust.

Breaking Down Signature-Based Detection: A Practical Guide

Nearly 90% of cyberattacks are known methods that proper systems can detect, but most organizations don’t have the best defenses. Signature-based detection is a vital aspect of cybersecurity. It offers some benefits but also has some drawbacks. This blog will break it down simply to help you strengthen your defenses against new threats.

Active Directory Incident Response: Key Things to Keep in Mind

Active Directory (AD) is crucial for network security as it controls access to sensitive data, making it a primary target for attackers. Even a small AD breach can result in significant data loss, operational downtime, and reputational damage in a business.