Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Securely bringing your own AI to Tines

At Tines, we take pride in both the flexibility and security of our platform: it’s what allows us to do things like safely connect to any HTTP API in the world, and seamlessly deploy in fully air-gapped environments. Similarly, our AI capabilities have been designed from the ground up to be secure and private, with no logging, internet transit, or training on your data.

CVE-2024-55591: Follow up: Authentication Bypass Vulnerability in Fortinet FortiOS and FortiProxy

On January 14, 2025, Fortinet published a security advisory for CVE-2024-55591, an authentication bypass using an alternate path or channel vulnerability in FortiOS and FortiProxy. A remote threat actor can craft requests to the Node.js websocket module to gain super-admin privileges.

Digital Transformation: The Future of Security Services

The security services industry is undergoing a significant transformation. As technology advances, traditional methods of safeguarding people, assets, and information are being supplemented-and in some cases, replaced-by digital innovations. To stay competitive, you need to understand how digital transformation impacts your operations, including leveraging tools like digital marketing for security companies. This article will explore how these changes are shaping the future of the security industry and what you can do to stay ahead.

The Guide to an Industrial Hangar Door: Types, Styles, and Benefits

Did you know that the global hangar doors market is projected to reach $427.6 million by 2032? This shows the growing demand for robust and versatile hangar door solutions. Choosing the right door can impact the functionality of your industrial space. These doors are more than just entrances. They play a critical role in the accessibility and efficiency of your facility. In this article, you'll discover the types, styles, and benefits of an industrial hangar door. You'll also learn how to choose the right one for your needs with this comprehensive guide. Keep reading to learn.

IT Controls: What They Are and How to Implement Them

IT controls refer to the frameworks and processes organizations use to manage their information systems securely and effectively. They support business operations by helping reduce cyber risks, ensure regulatory compliance and improve operational efficiency. Continue reading to learn more about the importance of IT controls, steps for implementation and how a PAM solution can enhance their effectiveness.

Navigating DORA Compliance: A Roadmap to Operational Resilience with Trustwave

The Digital Operational Resilience Act (DORA) is poised to reshape the European financial landscape, demanding a robust defense against cyber threats and operational disruptions and Trustwave is putting the pedal to the metal to prepare clients with our DORA Readiness Accelerator service. The Trustwave DORA Readiness Accelerator, which joins Trustwave’s CMMC readiness and Microsoft Security accelerators, provides a structured approach to achieving compliance and bolstering operational resilience.

Understanding ROPA: Who, What, Why?

ROPA is primarily utilized by organizations subject to data protection regulations. While it is a legal requirement for businesses of all sizes handling personal data, it is especially critical for large enterprises that process substantial volumes of data or sensitive information. Compliance officers, data protection officers (DPOs), legal teams, and IT departments often rely on ROPA to demonstrate compliance to regulators during audits or investigations.

Impossible Travel Detection with Torq: Defend Against the Most Prominent and Expensive Breach

With widespread remote work and global access, organizations face mounting challenges in securing user identities against sophisticated threats. One critical identity risk signal is impossible travel, where a user appears to log in from two unrecognized, geographically distant locations within an unrealistic timeframe, indicating the possibility of compromised credentials or session hijacking.

The Five Best Cloud Storage for Business Providers in 2025

Businesses are generating more data than ever, with 60% of company data being stored in the cloud, and businesses are storing 48% of their most important and sensitive data using some form of cloud storage. Even though businesses are using cloud storage, the risk of data breaches or attacks on company data is at the highest it's ever been, with 24% of breaches involving personal data and costing companies, on average, $4.88 million.