Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ISO/IEC 27001:2022: Key Requirements and How AppTrana WAAP Supports Compliance

With ever-evolving cyber threats and increasing regulatory scrutiny, ISO/IEC 27001:2022 offers a solid framework to manage information security systematically. Whether you are protecting sensitive data, building trust with stakeholders, or aiming for compliance, adhering to this standard is critical. This blog covers ISO/IEC 27001:2022’s key requirements and how AppTrana WAAP helps organizations stay compliant with robust security, threat detection, and vulnerability management.

Ensuring ISO/IEC 23894:2023 Compliance for AI Systems with AppTrana WAAP

ISO/IEC 23894:2023 is a relatively new international standard focused on AI risk management. It is designed to help organizations manage risks arising from the development, deployment, and use of Artificial Intelligence (AI) systems. While it’s AI-specific, many of its security-related clauses—especially those concerning web applications, APIs, and external-facing systems—apply broadly to ensure AI systems are secure, trustworthy, and resilient.

Financial Market Infrastructures: Opportunities for Leadership in Digital Asset Infrastructure

Financial market infrastructures (FMIs) form the backbone of the global financial system, playing a vital role in ensuring its safety, efficiency, and overall stability. FMIs—including payment systems, securities settlement systems, central securities depositories (CSDs), central counterparties (CCPs), and trade repositories—are now under growing pressure to evolve.

AI Is Reshaping Software. Is Your Security Strategy Keeping Up?

Software development is undergoing its biggest shift since the rise of cloud and DevOps. The difference this time? The shift is being driven by artificial intelligence, and it’s moving fast. AI-powered coding tools have rapidly made their way into developer workflows. Agents and LLMs are helping teams move faster, automate more, and build in entirely new ways. But speed often comes with tradeoffs.

Welcome-to-The New Era of AI-Driven Development

Artificial intelligence is no longer a future consideration. It’s here — and it’s changing how software is built. Fast. Enterprise teams are moving beyond AI pilots and proof-of-concepts. They’re rolling out real-world, high-value use cases and doing it at scale. According to IDC forecasting, AI spend will more than double by 2028. At the center of that surge is AI-assisted software development.

Preventing Supply Chain Cyberattacks: Lessons from the Marks & Spencer Breach

As more details of the April ransomware attack on UK retailer Marks and Spencer are made public, we are directly witnessing the cascading repercussions that organizations face when victimized by a well-thought-out and properly executed attack. In the specific case of M&S, the UK retailer is dealing with a supply chain attack, as M&S CEO Stewart Machin confirmed in a published report.

Eliminate Standing Admin Rights and Enforce Least-Privilege Policies With Endpoint Privilege Manager

Keeper’s Endpoint Privilege Manager is an advanced Privileged Elevation and Delegation Management (PEDM) solution that provides secure, just-in-time privileged access across your endpoints, significantly reducing the threat of ransomware, insider threats and data breaches – all without sacrificing productivity or performance.

NIST's Responsibilities Under the January 2025 Executive Order

While NIST frameworks are typically not mandatory for most organizations, they are still being called on to do some heavy lifting to bolster the nation’s cybersecurity defenses. Under the January 2025 Executive Order (EO) on Strengthening and Promoting Innovation in the Nation’s Cybersecurity, the National Institute of Standards and Technology (NIST) was charged, along with several other agencies, with the following tasks.