Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What the UK's New Cyber Resilience Bill Means for Businesses-and How to Stay Ahead

The UK is facing the same evolving digital challenges as the rest of the world, and its new Cyber Security and Resilience Bill is designed to not only help it catch up - but stay ahead. Attackers change their tactics all the time. Without an agile, living framework that gives lawmakers some breathing room, adversaries could easily outstrip the clunky government processes that govern cybersecurity (and often a step behind).

Why we need a unified approach to Kubernetes environments

Today, organizations struggle managing disparate technologies for their Kubernetes networking and network security needs. Leveraging multiple technologies for networking and security for in-cluster, ingress, egress, and traffic across clusters creates challenges, including operational complexities and increased costs.

The Psychology of Deception: How to Protect Yourself from Cyber Fraud

Cybersecurity typically focuses on technical defenses against threats. However, the study of deception can show how cybercriminals exploit human nature for their gain. Scamming is central in many cyberattacks, such as phishing, social engineering, and disinformation campaigns. We can gain insight into how these mechanisms work by mapping the emotions that bad actors aim to trigger in their victims.

The Change Healthcare hack wasn't just a breach-it was a wake-up call

"The US healthcare system is broken" is not an uncommon phrase. With no universal healthcare coverage, administrative inefficiencies, and an under-resourced primary care system, it's so bad that falling ill could very well bankrupt a citizen.

Introducing Aikido AI Cloud Search

Gain instant visibility into your cloud environment with Aikido Cloud Search. Search your cloud like a database. Whether you want to identify exposed databases, vulnerable virtual machines, or over-permissive IAM roles — Aikido gives you the power to uncover risk in seconds. No query language required, no waiting on devops. Just describe what you’re looking for, like “Give me all VMs with CVE-2025-32433 that have port 22 open.” Scroll down to "How It Works" to get technical.

How To Reduce Your Attack Surface with Secure Password Management

With the rise of remote work, cloud computing and mobile devices, your organization’s attack surface is larger than ever. Watch this short video to learn what an attack surface is, how to identify security vulnerabilities and five ways to minimize your attack surface.

Is Windsurf's SWE-1 Model a Game Changer? Let's See...

In this episode of my ongoing series testing AI coding tools, I put Windsurf’s latest model, SWE-1, to the test. The challenge? Build a secure note-taking app from scratch. I’m looking at everything from how it handles authentication and encryption to whether the code is clean, usable, and actually secure. If you're curious about how SWE-1 stacks up against other AI dev tools like GPT-4 or Claude, this video is for you.

Staying Ahead of Evolving Cyber Threats: What Security Teams Need to Know

Dan Bradbury, Chief Product Officer at UpGuard, kicks off our 20th Summit with a look at how far we’ve come—and where we’re headed. From AI-powered risk assessments to expanded threat intelligence, discover what’s new, what’s next, and how your feedback continues to shape our roadmap.