Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SCA Everywhere: Scan and Fix Open-Source Dependencies in Your IDE

Dependency issues are easiest to address when they show up directly in the development workflow. With this release, we’re bringing the full SCA workflow into the Aikido IDE extension, combining in-editor scanning with the ability to apply safe upgrades through AutoFix. Developers can detect vulnerable packages and resolve them without switching tools or breaking focus.

Safe Chain now enforces a minimum package age before install

The last few months have made something clear. Attackers are not guessing anymore. They are watching how developers install dependencies and they are using timing itself as an attack vector. Fresh versions are where attackers strike first and they strike fast. So we upgraded Safe Chain to close that window.

Cybersecurity in Healthcare: Protecting Patient Data in the Age of AI, IoMT, and Ransomware

Over the past decade, the global healthcare sector has undergone a sweeping digital transformation. Electronic Health Records (EHRs) moved to the cloud, hospitals adopted remote telemetry systems, pharmacies automated workflows, and AI-powered diagnostics entered day-to-day clinical practice. The result is a faster, more connected, and more data-rich healthcare ecosystem. But this connectivity has a cost.

One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM

Gartner has recognized One Identity as a Visionary in the 2025 Gartner Magic Quadrant for Privileged Access Management (PAM). In a rapidly transforming market, innovation and demonstrated performance continue to shape expectations. The placement as a Visionary reflects what the company observes across its customer and partner ecosystem, highlighting a collective emphasis on simplified security, accelerated adoption and intelligence-driven identity protection.

Why is Cyber resilience critical in the maritime industry more than ever

From navigating hostile weather to safeguarding crew and cargo, resilience is embedded into every operational decision in the maritime industry. Today, however, a new and less visible threat is reshaping what resilience means at sea: cyber risk. Digital transformation is providing great value through satellite navigation, automation, real-time fleet management and integrated logistics. But this connectivity has also expanded the attack surface.

6 Stages in a Threat Intelligence Lifecycle: Where Does Fidelis Fit In?

Contemporary threat actors employ sophisticated methodologies to execute advanced persistent threats that may remain undetected for extended periods. The evolving threat landscape necessitates comprehensive threat intelligence programs capable of transforming raw data into strategic threat intelligence. Organizations require structured processes that enable proactive security measures rather than reactive responses to cyber threats.

What is a Remote Workforce? Key Insights and Strategies for Success

A remote workforce is defined as having employees who perform their work away from a traditional office setting. Commonly, remote employees work from home or some other location with internet access. A co-working space is another popular flexible remote work environment, offering a dedicated and professional setting outside the home or traditional office.

Iberia Airlines data breach: What customers need to know

Spain's flag carrier Iberia Airlines disclosed a significant data security incident in November 2025 that should put all customers on high alert. The breach, which occurred through a compromised third-party supplier, has exposed personal information and created new risks for travelers who have flown with the airline.

16 Days of Activism: UK Strengthens Protections Against Online Gender-Based Harms

This week marks the start of the 16 Days of Activism Against Gender Based Violence, a global campaign from 25th November to 10th December that calls for action to end all forms of violence against women and girls. For us, as a charity supporting people harmed through technology, this period is an important reminder that digital abuse is now one of the most common and damaging ways gender based violence is carried out.