Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Beyond the Prompt: Data Security in Generative AI Platforms

Generative AI tools have changed how people work and play online. Everyone is excited about the speed and creativity these systems offer. Users often type sensitive info into prompts without thinking about where it goes. Security experts worry about how these platforms handle personal data. It is easy to forget that anything typed into a public bot might be stored. Staying safe means knowing how to use these tools without giving away secrets.

Tigera: Securing Autonomous AI Agents in Production

While the industry focuses on LLM accuracy, technical decision-makers are facing a more complex challenge: How do we govern the autonomous AI agents that will soon operate across our entire infrastructure? Without a dedicated control plane, autonomous agents introduce significant risks to identity, authorization, and auditability. This session moves past the AI hype to discuss the architectural constraints and security patterns required to run agentic systems in highly regulated, enterprise environments.

Tigera: From Reference Architecture to Production: A Kubernetes Workshop

Your team runs Kubernetes in production. You have clusters, workloads, and traffic flowing. But how much of your platform engineering time goes to maintaining the infrastructure between your tools - re-integrating after upgrades, synchronizing policies across a CNI, a service mesh, an ingress controller, and an observability stack that were never designed to work together? That operational overhead is the integration tax, and it grows with every cluster you add.

Tigera: Calculating The Integration Tax: What Your DIY Kubernetes Networking Stack Actually Costs

If you run a couple of clusters managed by a single team you probably don't notice the way using different tools for CNI, network policy, service mesh, observability, threat detection, and compliance can add up. As you scale, however, this 'integration tax', often hidden in engineer time lost to upgrade coordination, stretched MTTR due to separate L3 and L7 policies, and onboarding drag from multiple tools and query languages, becomes costly.

Tigera: From Reference Architecture to Production: A Kubernetes Workshop

Your team runs Kubernetes in production. You have clusters, workloads, and traffic flowing. But how much of your platform engineering time goes to maintaining the infrastructure between your tools - re-integrating after upgrades, synchronizing policies across a CNI, a service mesh, an ingress controller, and an observability stack that were never designed to work together? That operational overhead is the integration tax, and it grows with every cluster you add.

Obrela's 2025 Digital Universe Report highlights shift to stealthy, identity-driven cyberattacks

London, 21st April - Obrela has released its Digital Universe Report 2025, revealing a significant shift in the global cyber threat landscape as attackers move away from high-volume attacks toward more targeted, stealth-driven techniques focused on identity, access and persistence.

Managing the non-human identity lifecycle in modern environments

Non-human identities (NHIs) such as service accounts, API keys, tokens, and workload identities now outnumber human users by 10x or more in most organizations. Unlike human identities that follow HR-driven lifecycles, NHIs are often created ad hoc, granted excessive permissions, and rarely decommissioned. Effective NHI lifecycle management spans five stages: discovery and inventory, secure provisioning, ongoing monitoring, credential risk management (including rotation), and decommissioning.

Cyber Essentials v3.3: How MSPs can address their biggest concerns

While it is not technically required, the Cyber Essentials 3.3 set of standards is quickly becoming a necessity for organizations that need to ensure public sector contract, insurance and supplier assurance in the U.K. That’s good news for managed service providers (MSPs), who now have an opportunity to build both trust and revenue by guiding clients toward Cyber Essentials certification. Acronis recently surveyed U.K. partners about Cyber Essentials.

Agent-First Observability: Dynamic Data, High Cardinality, and the Business Impact

We want to transform how companies make decisions. That is not what you expect to hear from an observability company. Observability tools are supposed to help you monitor systems, debug incidents, and maybe reduce downtime. Useful, but not exactly the foundation for business decision making. So what does observability have to do with revenue, churn, or customer experience? More than you think, because observability already sits on top of the most important data in your business.