Compare DPDP and GDPR compliance requirements. Learn how they differ, why they conflict, and what Indian enterprises should prioritize – especially with AI deployment.
In this episode of The Connectivity Cloud Podcast with Cloudflare, host Mark Dembo is joined by Vladimir Krupnov, Threat Intelligence Lead at Revolut, and Blake Darché, Head of Cloudforce One and Threat Intelligence at Cloudflare, to expose the evolving tactics of cybercriminals and what it really takes to stop them.
Is shadow SaaS lurking in your organization? The answer is "yes". Now, what do you do about it? User Risk gives security teams complete visibility into their human risk, enabling safe AI adoption, and driving a security-first culture. Discover more of what User Risk can do for you.
What we heard loud and clear from security teams is that they’re flying blind when it comes to securing their workforce. In fact, companies often have more SaaS applications than they do employees. They just don’t realize it. Secondly, there’s a tremendously long tail of SaaS applications only being used by one person in the organization. Imagine trying to imagine that manually. User Risk, solves this visibility gap by giving organizations visibility into your human risk, enabling safe AI adoption, and driving a security-first culture.
Rate this post Last Updated on November 25, 2025 by Narendra Sahoo The NIS2 Directive has raised the bar for cyber resilience across Europe, and one of the biggest changes organizations are trying to wrap their heads around is the NIS2 incident reporting timeline. The timelines are tighter, the expectations are higher, and the penalties for delay or incomplete reporting are far more serious than under NIS1.
The evolution of your security stack is similar to the different phases of buying cars. In the beginning, you just need enough to transport a few items, maybe yourself and a few friends. The inexpensive two-door hatchback is perfect. However, as your family grows, whether with small humans or pets, you increasingly need more space and more capacity, leading to purchasing a four-door sedan or, even, a mini-van.
Opti9’s acquisition of Aptible, announced November 2025, fills a critical gap in how companies navigate cloud adoption in regulated industries. For over a decade, Aptible has been the go-to Platform as a Service (PaaS) for developers building healthcare applications that need HIPAA compliance from day one. Hundreds of startups and development teams have used Aptible to ship code without worrying about infrastructure complexity or compliance documentation.
The conversation about AI security has shifted. For the past year, the focus has been on the model itself: poisoning data, prompt injection, and protecting intellectual property. These are critical concerns, but they miss the bigger picture of how AI is actually being operationalized in the enterprise. We are entering the era of Agentic AI. AI is no longer just generating text; it is taking action. Autonomous agents read customer tickets, query databases, update financial records, and trigger workflows.
Authors: Tova Dvorin, Senior Product Marketing Manager On December 10, 2024, the EU Cyber Resilience Act (CRA) officially entered into force, marking the start of a three-year runway before its main obligations apply on December 11, 2027. While that might seem distant, the reality is clear: compliance preparation must begin now.
Every few months, a new compliance mandate makes its way into security teams' inboxes — something about data residency, audit readiness, or regulatory proof of control. In one such instance, a banking customer met with their IT and security leads to review reports before an audit. Their AppSec program was cloud-based, efficient, and scalable. Yet, the compliance officer had one clear instruction: “We need complete control.