Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How To Achieve Endpoint Visibility for Enhanced Endpoint Security

Endpoint visibility is fundamental to many of the processes that underpin effective endpoint security: data collection, monitoring, alerting (including alert analysis), and comprehensive threat detection and response. Trouble is, the number, types, locations, and use cases of endpoints are constantly in flux, due to user comings and goings, role changes, broad use of virtual instances and cloud-based workloads, Internet of Things (IoT) proliferation, hybrid work, and numerous other factors.

AI Data Privacy Concerns - Risks, Breaches, Issues in

Data is moving faster than your controls. In 2024, AI privacy/security incidents jumped 56.4%, and 82% of breaches involve cloud systems; the same lanes your LLMs, agents, and RAG pipelines speed through every day. If you’re shipping GenAI inside a regulated org, you need guardrails that protect PII/PHI and IP without crushing context or tanking accuracy. Use this guide to.

KeeperPAM Named Top-Rated Privileged Access Management Solution in 2025 EMA Report

Accounts with unnecessarily elevated – and standing – permissions to an organization’s critical infrastructure are prime targets for threat actors. This is the case for all industries, but especially organizations in the finance, healthcare and manufacturing industries. This heightened risk has made protecting privileged access a top priority for cybersecurity teams globally.

Super Simple SOBR Migration: How to Move Your Veeam Capacity Tier to 11:11 Object Storage for Amazon S3

As you can tell I’m on a bit of a “migrate all the things” story arc here of late and today will be the latest installment. In my last post I covered using the VeeaMover capability to move backups between repositories or jobs but that is not an effective data migration mechanism if you’ve used the Capacity Tier “COPY” capability of a Veeam Scale Out Backup Repository (SOBR).

AI Data Privacy Concerns - Risks, Breaches, Issues in 2025

Data is moving faster than your controls. In 2024, AI privacy/security incidents jumped 56.4%, and 82% of breaches involve cloud systems; the same lanes your LLMs, agents, and RAG pipelines speed through every day. If you’re shipping GenAI inside a regulated org, you need guardrails that protect PII/PHI and IP without crushing context or tanking accuracy. Use this guide to.

The Social Engineering Threats You Can't Ignore - And Why Most Are Inherently Mobile Problems

When most people think about cybersecurity, they picture firewalls, anti-virus software, and complex passwords. But the weakest link isn’t a server or a laptop—it’s a person. Social engineering attacks exploit human behavior rather than technical vulnerabilities, and four techniques dominate the landscape today: phishing, smishing, vishing, and quishing.

How You Can Detect & Respond to Attack Patterns in Threat Feeds with XDR

Organizations gather massive volumes of threat feed data—IP addresses, hashes, domains, tactics—but these often remain siloed or poorly correlated, leaving high-value alerts buried in noise. When those raw indicators live in separate systems, you end up chasing every alert, missing the bigger picture of coordinated attacks. Your team feels stuck in reactive mode, firefighting low priority alerts while real attackers move freely.

Architecting a Production-Grade Anti-Phishing Defense System with the NVIDIA NeMo Agent Toolkit and NIM

Konstantin (Kostya) Ostrovsky is the Chief Architect at Torq, where he leverages over 18 years of experience in software engineering and architecture. He specializes in cybersecurity, with a background that began with writing Windows Kernel Drivers. Konstantin is also a frequent speaker at software engineering conferences globally. Phishing attacks have evolved significantly in recent years, rendering traditional, rule-based defenses ineffective against sophisticated threats.

FedRAMP 20x Phase One: What is The New Pilot Program?

By now, you likely know the basics of FedRAMP, especially if you’ve read our robust coverage of the program. But, like all good cybersecurity frameworks, it evolves and changes over time, and our knowledge needs to be updated. One recent development is the 20x pilot program, which entered phase one in March of 2025. What is this pilot program, what does it do, and who is it for? Read on to learn more about 20xP1 and what it means for you.

Managed WAF Done Right: Turning Security into CFO-Grade ROI

When CISOs and security teams evaluate a Web Application and API Protection (WAAP) platform, the conversation often starts and ends with technical capabilities. That focus is natural, but it does not reflect the full decision-making process in most enterprises. Security leaders may drive the evaluation, yet true adoption requires building consensus with finance and procurement teams who view the investment through a different lens.