Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Your Data, Your Rights: A Comprehensive Guide to Data Protection and the Role of the Data Protection Officer

Information is the raw material and the new oil that drives today's economy, helping businesses and organizations upgrade the services they deliver. However, with the unprecedented expansion in data comes the need for data security-the protection of personal data against access, use, and disclosure.

Demystifying EU Regulations: DORA and NIS2 - What They Mean for Your Business

Ahead of the EU’s Digital Operational Resilience Act (DORA) coming into force on 17th January 2025, and on the back of the updated Network and Information Security Directive (NIS2) coming into effect from 17th October of this year, organisations across Europe are scrambling to understand what these regulations mean for them. The initial reaction from many businesses is one of concern, and understandably so, non-compliance can lead to significant penalties and reputational damage.

ISO 27001 Certification Expired: Why, and What Can You Do?

Two years ago, The International Organization for Standardization (ISO) published a long-awaited update to their primary cybersecurity framework, ISO 27001. The previous version, ISO 27001:2013, was nearly a decade old and in need of a refresh. The new version, ISO 27001:2022, is currently the version in effect. As part of the roll-out of ISO 27001:2022, companies were given instructions on how to transition to the new version from the 2013 version.

Enhancing Data Security and Privacy with Protecto's AI-Powered Tokenization

The inherently non-deterministic nature of AI inputs, processing, and outputs multiplies risks, making traditional data protection methods insufficient. In the enterprise world, unstructured data—brimming with sensitive information such as Personally Identifiable Information (PII) and Protected Health Information (PHI)—poses a significant challenge, especially as this data flows into AI agents.

Best Data Privacy Tools to Use in 2025: Protect Your Sensitive Information

Data privacy has become a major concern for businesses and individuals alike. With increasing cyber threats and stringent data protection regulations, organizations must adopt advanced tools to safeguard sensitive data. As we move into 2025, selecting the right data privacy tool is crucial for ensuring compliance and preventing unauthorized access. This blog explores the top 10 data privacy tools for 2025, highlighting their features, advantages, and potential drawbacks.

Confidential computing at 1Password

At the heart of 1Password’s security model is our use of end-to-end encryption. This means that your passwords and other secrets are encrypted on your device before being sent to the cloud. Without your encryption keys (derived from your account password and Secret Key), it’s cryptographically impossible for anyone to read your data, even us at 1Password.

The Developer's Guide to the Cyber Resilience Act

In February 2024, Change Healthcare, one of the biggest IT solution companies in the U.S. healthcare system, suffered from a ransomware attack resulting in a complete shutdown of their IT system. Because of this attack, hospitals and pharmacies experienced interruptions in patient treatments, as well as in payments for several weeks. This is a nightmare for any software developer, security engineer or a company.

A Comprehensive Look into Password Attacks and How to Stop Them

There are some things you want to keep private such as your bank account number, government ID number, etc. In the digital age, that includes the passwords that protect these accounts because once your account credentials are compromised, cybercriminals can get that information. That is why password attacks have become so prominent today.