Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Featured Post

The Value of Threat Intelligence in Ensuring DORA Compliance

"Expect the unexpected" is a saying that holds particular weight in cybersecurity. In 2025, with continuing technological advancement, the divide between game-changing business opportunities and serious cyber threats has never been starker. With innovation and disruption unlikely to slow the pace any time soon, all sectors must build their operational resiliency to stay ahead and ensure stability.

Takeaway from RSAC 2025: Focus on AI Utility

If you are at all involved in cybersecurity, then chances are you attended or talked to someone about the RSA Conference 2025. This year’s theme was “Many Voices, One Community” – a spot on description based on my experience. Yes, there were many voices – mostly talking AI, specifically agentic AI which is driving innovation and demand for security solutions.
Featured Post

Improving Cyber and Mental Resilience with Threat Information Sharing

In a world where data provides companies with a competitive advantage, sharing it amongst other businesses, especially in the same industry, may seem counterproductive. However, in cybersecurity, where every company is a potential target for threat actors and organizations are increasingly interconnected through supply chains, sharing information can significantly enhance a company's security posture and overall resilience.

The Value of Threat Intelligence in Ensuring DORA Compliance

“Expect the unexpected” is a saying that holds particular weight in cybersecurity. In 2025, with continuing technological advancement, the divide between game-changing business opportunities and serious cyber threats has never been starker. With innovation and disruption unlikely to slow the pace any time soon, all sectors must build their operational resiliency to stay ahead and ensure stability.

People, Process, Technology: How Cybersecurity Automation Fuels the Virtuous Circle

Cybersecurity isn’t just about tools and firewalls — it’s about people. Cybersecurity automation is proving to be a game-changer, not only for security outcomes but also for the people behind them. For many organizations, automation is now tightly aligned with employee satisfaction and retention. In fact, 47% of organizations see workforce morale as a key performance indicator (KPI) when evaluating the return on investment (ROI) of their cybersecurity automation efforts.
Featured Post

How to keep major worldwide sporting events on secure ground using threat intelligence reporting

As we look at the sporting calendar for 2025 with the UEFA Women's European Championship in Switzerland and the Tour de France in July, as well as the 2025 Women's Rugby World Cup in the UK starting in August, armchair sportspeople and in-person spectators are spoilt for choice. But aside from the marvel of watching athletes compete to achieve their dreams, the organization (and security) of such events requires meticulous planning, particularly as dates are fixed and immovable. To put this into context, the Olympic Games are one of the most widely covered sporting events in the world, with an audience of more than 4 billion viewers.