Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Build HIPAA-Compliant Infrastructure on AWS

Many healthcare organizations want to move workloads to AWS but stall because they’re uncertain how to maintain HIPAA compliance in the cloud. The good news: AWS provides the tools and certifications needed for HIPAA-eligible services. The challenge is implementing them correctly. AWS has been HIPAA-eligible since 2013 and currently offers over 150 services that can be used in HIPAA-compliant architectures. But eligibility doesn’t equal compliance.

Using LLMs, CVSS, and SIEM Data for Runtime Risk Prioritization

A recent University of North Carolina Wilmington study tested whether general-purpose large language models could infer CVSS v3.1 base metrics using only CVE description text, across more than 31,000 vulnerabilities. The results show measurable progress, but they also expose a hard limit that matters far more than model selection: Model quality helps, but missing context sets a ceiling on reliability.

Building Cyber Resilience Beyond Defence - Chris Hallenbeck, CISO at Tanium

In this interview with iTnews, Chris Hallenbeck, CISO at Tanium, discusses the critical shift from traditional cyber defence to proactive resilience. He highlights why organisations must prepare for inevitable incidents through proactive visibility, rapid response, and muscle-memory preparedness, emphasising that resilience isn’t about preventing every breach, but minimising impact and ensuring business continuity.

Building Trust and Autonomy in the Age of Agentic AI - Saqib Khan, Global Field CIO at Tanium

Speaking with iTnews, Saqib Khan, Global Field CIO at Tanium, explores how real-time, trustworthy endpoint data forms the foundation of Agentic AI. He explains why confidence in data sources is key to enabling autonomous decision-making, reducing incidents, and driving faster, more reliable outcomes across IT and cybersecurity environments.

Why Visibility & Agility Define Enterprise Resilience - Erik Gaston (Tanium)

In this interview with iTnews, Erik Gaston, Vice President of Global Executive Engagement at Tanium, highlights why enterprise resilience today depends on visibility, speed, and alignment between technology and business outcomes. He explains how organisations can stay proactive amid evolving threats, emphasising that in the digital era, "slow is the new down".

Sensitive Data Is the Common Thread Across Most OWASP Top 10 Issues. Here's Why

The OWASP Top 10 is usually presented as a list of technical failures. Broken access control. Injection. Insecure design. Misconfiguration. Each category points to something that went wrong in the application. What it doesn’t say explicitly is what was actually at risk when it went wrong. In most real incidents, the answer is not “the application.” It’s the data inside it. Sensitive data is the reason attackers care about OWASP failures in the first place. Credentials.