Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Modernising the Grant Process: Time-Saving Tools for a Stress-Free Experience

If you've ever worked on a grant program, you know what I'm talking about. The stacks of documents, the maze of spreadsheets, the endless email tag, and the specter of a compliance audit hanging over your head. For decades, this administrative drudgery has been tolerated as an evil necessary for securing funding. But what if it doesn't have to be this way? The inefficiency and stress of old-school grant management are not only frustrating; they actually take resources away from your organisation's central cause.

Data Governance: A Comprehensive Guide to Implementation

Implementing effective data governance in an organization requires a strategic approach that encompasses several key components. The first step is to establish a clear vision and objectives for data governance. This involves defining what data governance means for your organization and identifying the specific goals you aim to achieve. These goals could include improving data quality, ensuring data security, or enhancing data accessibility.

Best Tools to Scan Open Source Dependencies in 2025

Open source libraries form the backbone of modern software – but they can also introduce serious vulnerabilities if left unchecked. High-profile incidents like the Log4j “Log4Shell” fiasco proved that a single flawed dependency can put countless organizations at risk. In fact, a 2024 report found that 84% of codebases contained at least one known open source vulnerability, and 74% had high-risk vulnerabilities – up sharply from the previous year.

2025 Trends in IoT Device Identity and Access Management (IAM)

As the number of IoT devices and connected devices continues to surge, IoT security has become a critical component of the modern IoT ecosystem. Ensuring the confidentiality, integrity, and availability of data across IoT networks is essential to protect against cyber threats and data breaches. With billions of devices now connected to the internet, the attack surface for malicious actors has expanded dramatically, making robust security measures more important than ever.

Splunk Named a Leader in The Forrester Wave: Security Analytics Platforms, Q2 2025

We’re honored to share that Splunk has been named a Leader in The Forrester Wave: Security Analytics Platforms, Q2 2025. Splunk is committed to power the SOC of the Future by providing a unified threat detection, investigation, and response (TDIR) experience — no matter their deployment requirements.

Trustwave SpiderLabs' 2025 Risk Radar Report: Technology Sector

Threat actors know that technology makes the world go round, and these adversaries are more than willing to use every cyber weapon at their disposal to take advantage of that fact, according to Trustwave SpiderLabs’ 2025 Trustwave Risk Radar Report: Technology Sector.

The Heightened Threat of Iranian Cyber Attacks: How to Understand the Risk and Enhance Resilience

The physical conflict involving Iran that has played out in the Middle East over the last several days is expected to increasingly spill over into the cyber realm. According to the Department of Homeland Security, the Cybersecurity and Infrastructure Security Agency (CISA), and other cybersecurity experts, organizations in the US should begin preparing for increased cyber attacks from pro-Irianian hacktivists and Iranian government-affiliated actors in the coming days and weeks.

What's New in CyCognito: June 2025 Platform Enhancements

In today’s high-stakes cybersecurity landscape, one truth stands out: if you can’t see it, you can’t secure it. And if you can’t act on what you see, you’re no better off. That’s why we’re focused on delivering continuous improvements that help security teams move faster, see further, and reduce risk where it matters most.

Understanding CRA Compliance: Overcoming Challenges with an Integrated Security Testing Approach

Shipping software into the EU now comes with serious strings attached. The Cyber Resilience Act (CRA), in effect since December 2024, sets strict new rules for any company offering digital products or services in the region, whether you’re a local startup or a global platform. The regulation aims to improve cybersecurity across connected devices and cloud-based software.