Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DPDP 2025: What Changed, Who's Affected, and How to Comply

India’s Digital Personal Data Protection Act, 2023 (DPDP Act) is finally moving toward activation. In January 2025 the government published the Draft Digital Personal Data Protection Rules, 2025 for public consultation to operationalize the Act. As of late 2025, the Act is enacted but core provisions still await final notification, so a phased rollout remains likely.

A multi-cloud BCP approach for CPS 230 compliance using CloudCasa

When Amazon Web Services’ US-East-1 region went down recently, a long list of global apps and services went with it. For most companies, that meant a few hours of frustration. For APRA-regulated financial institutions in Australia, an outage like that is something much more serious — a compliance and operational-resilience test under CPS 230, which is now in force as of July 2025.

How FedRAMP Agencies Evaluate CSP SAR Submissions

FedRAMP is the federal government’s framework for evaluating and enforcing standardized security across the cloud service providers operating as contractors. They take security seriously, and the protection of controlled information is their top priority. A key part of validating the security of a CSP is the SAR, or Security Assessment Report. What is the SAR, and how do FedRAMP agencies evaluate SAR submissions?

Unlock resilient growth: Master climate change risk in 2026

Climate change is no longer a distant threat; it has become a defining issue of our time. Rising global temperatures, unpredictable weather patterns, and shifting socio-economic landscapes are reshaping how businesses operate and how governments serve their constituents. In the midst of these enormous challenges, there is one undeniable truth: resilient growth hinges on the capacity to understand, manage, and adapt to climate change risk.

Automating compliance: Why identity security needs a data-driven tune-up

When I started my career on the trade floor of a Canadian bank, I quickly learned what it meant to work in a fast-paced, highly regulated environment. Every identity had to be secured, justified and auditable. Later, when I moved to the security engineering team, I saw firsthand how compliance could consume entire teams. We weren’t just protecting accounts; we were constantly running manual processes to prove that the right controls were in place.

PCI DSS 6.4.3 Is the Canary in the Coal Mine for Client-side Security

Here's the hard truth: 98% of websites load third-party scripts. Few teams know exactly what scripts are loaded. Even fewer know what those scripts do (what elements in the browser they are interacting with), and a miniscule amount of teams have any control over what those scripts do. When I say "teams" I'm referring to different stakeholders - security engineers, risk & fraud analysts, compliance managers, and even the marketing department. That's one of the challenges of client-side security. Almost every internal department touches the website. It might be the most collectively edited environment that exists in a company.

The AI buzzword trap in compliance tools | Heard in the founder chat ft. Inflo's Tom Skelton

“AI-powered.” “AI-native.” “End-to-end AI.” At some point, it all sounds the same—but it’s not. In this “Heard in the Founder Group Chat” episode, Tom Skelton, Information Security and Technology Lead at Inflo, shares how to spot real AI that saves time (and risk)—and how to avoid platforms that just rebrand old features.

Secure your digital assets successfully: Ultimate guide to cybersecurity controls

The digital assets are among the most valuable resources for businesses, governments, and private individuals alike. Cyber threats are evolving constantly, and securing data, networks, and digital operations requires not only advanced technology but also a deep understanding of cybersecurity controls.

The Compliance Gap: How Untracked User Lifecycle Changes Create SOC 2 Audit Failures

Forty-seven ghost accounts cost one SaaS company a $2M deal. Their SOC 2 auditor flagged a critical issue: former employees still had active system access, even those terminated six months earlier. The security team invested heavily in firewalls, encryption, and penetration tests. They failed on something more urgent: proving immediate access removal when people left.