Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DSPM for the Modern Enterprise: One Unified View of Data Risk Everywhere

Security teams today aren't struggling with a lack of data, they're struggling with a lack of clarity. Sensitive data now lives and moves across endpoints, SaaS applications, cloud infrastructure, and AI systems. Understanding where that data is, how it's used, and when it becomes risky has never been more important — or more difficult.

Utilities Under Pressure: Delivering Resilience That Holds Up

Regulators view operational resilience as a top priority. This is not surprising as according to Sophos, in 2024 nearly two-thirds of energy, oil, gas, and utilities organisations reported ransomware attacks, with average recovery costs rising to around $3 million. This is a clear reminder that real-world disruptions are already affecting the sector.

New Phishing Campaign Spreads Via LinkedIn Comments

A widespread phishing campaign is targeting LinkedIn users by posting comments on users’ posts, BleepingComputer reports. Threat actors are using bots to post the comments, which impersonate LinkedIn itself and inform the user that their account has been restricted due to policy violations. The comments contain links to supposedly allow the user to appeal the restriction.

AI Literacy Training: From Best Practice to Legal Requirement Under the New EU AI Act

For those of you who are like me, when I first heard about the new EU AI Act, I had flashbacks to the implementation of the General Data Protection Act (GDPR) back in 2018. There are certainly a lot of similarities with the EU leading the way in consumer protections that will likely lead to more, similar legislation across the globe. I’m also reminded of the iPhone when it was introduced in the consumer market and bled into the workplace (I for one held onto my Blackberry for as long as I could).

The Skeleton Key: How Attackers Weaponize Trusted RMM Tools for Backdoor Access

KnowBe4 Threat Labs recently examined a sophisticated dual-vector campaign that demonstrates the real-world exploitation chain following credential compromise. This is not a traditional virus attack. Instead of deploying custom viruses, attackers are bypassing security perimeters by weaponizing the necessary IT tools that administrators trust. By stealing a “skeleton key” to the system, they turn legitimate Remote Monitoring and Management (RMM) software into a persistent backdoor.

Vendor Acquired? What It Means for Your PAM Strategy

Over the past two years, we’ve watched a steady wave of acquisitions reshape the privileged access market. For many security leaders, that wave has now hit home. Your PAM vendor has been acquired, absorbed into a larger platform, and suddenly the roadmap you once relied on feels less certain. This moment is easy to dismiss as “business as usual.” It is also one of the rare points where it actually makes sense to step back and reassess your PAM strategy with fresh eyes.

Understand the difference: Disaster recovery vs. DRaaS (and why it matters)

When a cyberattack or natural disaster strikes, the challenge isn’t just restoring data quickly — it’s resuming business operations just as fast. That’s where the distinction between disaster recovery (DR) and disaster recovery as a service (DRaaS) becomes critical for businesses. White paper A practical blueprint for cyber resilience to evolve from prevention to continuity.