Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep 19: The atomic habits of cybersecurity professionals

In this Masters of Data episode, we welcome back Zoe Hawkins and Roland Palmer to discuss building better security practices through small, incremental improvements personally and professionally. We emphasize regularly auditing security policies to avoid unnecessary friction that forces workarounds, treating security as sociology rather than just technology. We cover practical approaches like habit-stacking, weekly business reviews, staying informed about threats through intentional news consumption, and developing cognitive humility with security prompts.

The Missing Link in OWASP is Found: Business Logic Abuse#owasp #owasptop10 #businesslogic

For years, security lists focused on technology (Cloud , Mobile , Serverless ). We desperately needed a list that focused on the core problem: flawed application logic, regardless of the stack. The OWASP Top 10 Business Logic Abuse (BLA) list fills that critical, architectural gap. Why? Because exploitation often happens between technologies, not within them. We must be able to categorize and talk about these intricate logic threats in a technology-agnostic way.

Inside Cybersecurity's New Arms Race with Vladimir Krupnov and Blake Darché

In this episode of The Connectivity Cloud Podcast with Cloudflare, host Mark Dembo is joined by Vladimir Krupnov, Threat Intelligence Lead at Revolut, and Blake Darché, Head of Cloudforce One and Threat Intelligence at Cloudflare, to expose the evolving tactics of cybercriminals and what it really takes to stop them.

Shadow SaaS IS lurking in your organization. Here's what you need to know.

Is shadow SaaS lurking in your organization? The answer is "yes". Now, what do you do about it? User Risk gives security teams complete visibility into their human risk, enabling safe AI adoption, and driving a security-first culture. Discover more of what User Risk can do for you.

Flying blind on workforce security? Let User Risk be your co-pilot.

What we heard loud and clear from security teams is that they’re flying blind when it comes to securing their workforce. In fact, companies often have more SaaS applications than they do employees. They just don’t realize it. Secondly, there’s a tremendously long tail of SaaS applications only being used by one person in the organization. Imagine trying to imagine that manually. User Risk, solves this visibility gap by giving organizations visibility into your human risk, enabling safe AI adoption, and driving a security-first culture.

NIS2 Incident Reporting Timeline and How Companies Should Prepare

Rate this post Last Updated on November 25, 2025 by Narendra Sahoo The NIS2 Directive has raised the bar for cyber resilience across Europe, and one of the biggest changes organizations are trying to wrap their heads around is the NIS2 incident reporting timeline. The timelines are tighter, the expectations are higher, and the penalties for delay or incomplete reporting are far more serious than under NIS1.

5 Signs You've Outgrown Your Open-Source SIEM

The evolution of your security stack is similar to the different phases of buying cars. In the beginning, you just need enough to transport a few items, maybe yourself and a few friends. The inexpensive two-door hatchback is perfect. However, as your family grows, whether with small humans or pets, you increasingly need more space and more capacity, leading to purchasing a four-door sedan or, even, a mini-van.

How Opti9's Acquisition of Aptible Creates the Complete Compliance-First Cloud Solution

Opti9’s acquisition of Aptible, announced November 2025, fills a critical gap in how companies navigate cloud adoption in regulated industries. For over a decade, Aptible has been the go-to Platform as a Service (PaaS) for developers building healthcare applications that need HIPAA compliance from day one. Hundreds of startups and development teams have used Aptible to ship code without worrying about infrastructure complexity or compliance documentation.