Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New Spotlight Report on Healthcare Identifies the Need for a Culture of Cybersecurity

Cybersecurity is a business requirement. Taking a holistic view of cybersecurity as part of the business means that risk, budget, and innovation can achieve balance. In a global survey of 220 healthcare organizations the prevailing wisdom shows that 43% effectively align business risk appetite with cybersecurity risk management, 43% allocate cybersecurity budget to every project from the beginning, and 55% believe they can risk more with innovation because they take an adaptive approach to cybersecurity.

COPPA Compliance: Top 5 Website Security Tips for Kids

In the digital era, safeguarding children’s online privacy is paramount. The Children’s Online Privacy Protection Act (COPPA) establishes stringent guidelines for websites and online services targeting users under 13 years of age. Non-compliance can lead to significant legal repercussions and erosion of user trust. This article delves into comprehensive website security strategies to ensure COPPA compliance and protect children’s online privacy.

The Future of Developer Upskilling Is Human-Led, AI-Supported

In the last year, generative AI has dramatically accelerated how software is written. Developers can generate entire functions with a prompt, automate repetitive logic, and offload everything from boilerplate code to documentation. But with this newfound speed comes a deeper, more complex challenge: ensuring that what’s being created is secure, trustworthy, and production-ready.

New Ransomware Groups Emerging in Late May 2025: A Threat Intelligence Overview

As of the end of May 2025, seven new ransomware groups have surfaced with active leak sites and confirmed victim postings. These groups—Silent Ransomware, Gunra Ransomware, JGroup Ransomware, IMN Crew, DireWolf Ransomware, DataCarry Ransomware, and SatanLock Ransomware have demonstrated early signs of active targeting and data exfiltration campaigns. This blog provides a detailed breakdown of their activity, initial victimology, and attribution by geography where applicable.

Stop Playing Defense: Confronting Tech Debt in a Modern Threat Landscape

When it comes to safeguarding your most vital data and digital operations, clinging to legacy systems and outdated processes isn’t just a bottleneck – it’s a liability. Organizations that delay necessary upgrades or operate with patchwork security frameworks not only accumulate tech debt but are extending an open invitation for cyber criminals to exploit vulnerabilities. Take a hard look at your current systems. Are they equipped to keep up with modern threats?

What Is the Role of Privileged Access Management in Protecting Sensitive Data?

Privileged Access Management (PAM) plays a crucial role in protecting sensitive data by controlling, monitoring and limiting access to systems and accounts. PAM focuses specifically on managing accounts with elevated permissions, such as administrator or root accounts. These accounts, if compromised or misused, can pose significant security risks and potentially lead to severe data breaches.

Shadow AI: Managing the Security Risks of Unsanctioned AI Tools

The explosion of generative artificial intelligence tools is sparking a wave of enthusiasm in workplaces, with employees eagerly embracing new applications to boost productivity and innovation. However, this adoption often leads to a new phenomenon known as shadow AI—the use of artificial intelligence tools within an organization without explicit approval or oversight from IT and security teams. Unsanctioned use of AI creates significant (and often invisible) security blind spots.

Data Leakage and Other Risks of Insecure LlamaIndex Apps

Similar to Ollama and llama.cpp, LlamaIndex provides an application layer for connecting your data to LLMs and interacting with it through a chat interface. While LlamaIndex is an open source project like other LLM application frameworks, LlamaIndex is also a company, with a recent Series A, a commercial offering, and a more polished aesthetic than their strictly DIY counterparts.