Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DDI Central 5.5 is here-with DNS threat intelligence, OpManager Plus integration, and more!

We’re excited to announce the launch of DDI Central version 5.5, a release shaped by the most demanded features from our customers and the ever-growing need for stronger security at the core of enterprise networks. With this version, the spotlight is on security, resiliency, and device-diagnostics driven IP address management.

Keeping Britain connected: The crucial role of cybersecurity automation in national infrastructure

As the UK’s vital services face escalating digital threats, the role of intelligent automation in cybersecurity has become paramount. Chris Jacob, VP, Global Field Operations at ThreatQuotient, outlines why proactive, automated defences are crucial for safeguarding the critical national infrastructure that powers the nation.

Coralogix Expands Unified Threat Intelligence Coverage

Coralogix is excited to announce a major enhancement to our Unified Threat Intelligence (UTI) capabilities – now with expanded IOC matching beyond IPs. While our earlier focus was primarily on detecting malicious IP addresses, threats have evolved. Attackers now hide behind encrypted traffic, disposable domains, and polymorphic files. To stay ahead, we’ve normalized new critical fields – JA3, JA4, domain, URL, and file hash and integrated them into our UTI engine.

Improving Cyber and Mental Resilience with Threat Information Sharing

In a world where data provides companies with a competitive advantage, sharing it amongst other businesses, especially in the same industry, may seem counterproductive. However, in cybersecurity, where every company is a potential target for threat actors and organizations are increasingly interconnected through supply chains, sharing information can significantly enhance a company’s security posture and overall resilience.

Building a Global Regulatory Strategy with Threat Intelligence

Cybersecurity regulations are proliferating worldwide, but organisations are struggling to keep pace with the growing number of rules and risks. The growing maze of mandates, from the EU's Network and Information Security Directive 2 (NIS2) and the Digital Operational Resilience Act (DORA) to the US's Securities and Exchange Commission (SEC) disclosure rules, is creating fragmentation, complexity, and an urgent need for smarter compliance strategies.

The Next Chapter in Stopping Threats Before They Breach Your Network

You’ll notice things look different. Because the world you’re defending has changed—and so have the stakes. Every breach proves the same thing: the tools you’ve been given aren’t enough. Firewalls let attacks through. “Next-gen detection” leaves you drowning in alerts after the fact. Threat intelligence is treated like a forensic tool, not a preventative defense.