Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding the Australian Information Security Manual (ISM)

The Essential Eight identifies the most critical cybersecurity risk mitigation controls, providing a set of minimum baseline strategies. As organizations work to mature the security posture, the Essential Eight maturity model offers some options that they can use. However, for organizations that need to implement a more comprehensive security program, the Australian Signals Directorate (ASD) published the Information Security Manual (ISM).

What is the OWASP Top 10 Agentic AI

Published by the Open Worldwide Application Security Project (OWASP) in 2025, the OWASP Top 10 for Agentic Applications 2026 identifies security risks that organizations need to consider when implementing agentic artificial intelligence (AI) systems. The guide focuses on how threat actors can exploit agentic systems in new ways and on the associated risk mitigation strategies.

Logs & Lattes: Episode 6 - How Small SOC Teams Stop Drowning in Alerts

Lean security teams don't need a smaller version of an enterprise SOC. They need a different approach entirely. Graylog Director of Product Management, Rich Murphy, joins Logs and Lattes to explain why 2-to-4-person security teams are the most underserved segment in cybersecurity and what needs to change.