Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Engine Room: Powering Your Human Risk Management Strategy with Intelligent Tech

We’ve come a long way. We’ve deconstructed the problem, explored the complexity of humans, and laid out a strategic framework and a practical map—all of which can be explored in more detail in our Human Risk Management (HRM) whitepaper. Now for the final piece of the puzzle: the engine. A strategy this dynamic and personalised can't run on spreadsheets and manual effort alone. It needs to be powered by an intelligent, integrated platform.

A Practical DORA Compliance Testing Checklist

The Digital Operational Resilience Act (DORA) is a legislative measure of the European Union designed to enhance the digital operational resilience of financial institutions. It has been in effect since January 17, 2025. Drafted to ensure that banks, insurance companies, and other financial intermediaries, as well as stock exchanges and trading platforms, can withstand, respond to, and recover from ICT (Information and Communication Technology) disruptions.

Aikido + Secureframe: Keeping compliance data fresh

TL;DR: Aikido now integrates with Secureframe. Vulnerability data syncs automatically so SOC 2 Type 2 and ISO 27001:2022 evidence stays accurate. 16 tests and 5 controls handled for you. Secureframe makes it easier to run SOC 2, ISO 27001, HIPAA and PCI DSS programs. But compliance tools only work if the data inside them is accurate. Too often, teams end up exporting CSVs, uploading reports, or sharing screenshots that are already outdated by the time an auditor looks at them.

The Straight-Talking CISO We All Need | Marius Poskus on Razorwire

Marius Poskus wears many hats — CISO, podcaster, consultant, speaker — and he’s got opinions that cut through the noise. In this new episode of Razorwire, we explore why so many cyber leaders are burned out, how AI is creating new security headaches, and why honesty, community and curiosity matter more than ever. Catch the full conversation when the episode drops Wednesday 15th October.

Marius Poskus on Why Most Security Advice Is Too Vague

Security leaders are drowning in generic advice — and Marius Poskus is done with it. In this episode of Razorwire, we talk about cutting through buzzwords, the trap of overtooling, and why Marius believes more CISOs should talk like real people. The full episode drops Wednesday 15th October.

Maximizing Security and Compliance in Microsoft 365: A Guide to Shared Responsibility

In the ever-evolving landscape of digital work environments, Microsoft Office 365 stands as a cornerstone for over a million global companies, as highlighted by a recent Statista report (2024). This ubiquitous tool has become indispensable for organizations navigating hybrid work models and global economies, harnessing its collaborative capabilities alongside the imperative need for robust data protection strategies.

Monitor OCI Audit Logs with Datadog Cloud SIEM

Oracle Cloud Infrastructure (OCI) provides compute, storage, networking, and database services for running enterprise applications and workloads in Oracle. OCI supports both traditional and cloud-native applications, offering scalable, secure, and high-performance infrastructure for hybrid and multi-cloud environments. Securing workloads in OCI can be complex for organizations managing a mix of on-prem, hybrid, and cloud environments.

Why ICS Cybersecurity Should Be a Top Priority for Industrial Organizations

The systems that manage our critical infrastructure-from power grids and water treatment plants to manufacturing lines and transportation networks-are the unseen engines of modern society. These Industrial Control Systems (ICS) are complex networks of hardware and software that monitor and control physical processes. For decades, they operated in isolated, air-gapped environments, separated from the corporate IT world. However, the convergence of Information Technology (IT) and Operational Technology (OT) has erased these traditional boundaries, exposing vital industrial processes to a landscape of sophisticated cyber threats.

Key Challenges and Solutions in NAC Implementation

Network Access Control (NAC) has become a cornerstone of modern cybersecurity strategy, acting as a gatekeeper that verifies every user and device attempting to connect to a corporate network. As organizations embrace trends like Bring Your Own Device (BYOD), remote work, and the Internet of Things (IoT), the network perimeter has dissolved, making it critical to enforce security policies at the point of access. While the benefits are clear, the path to a successful NAC implementation is often filled with obstacles.