Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cloak Ransomware: Who's Behind the Cloak?

Emerging between late 2022 and the beginning of 2023, Cloak Ransomware is a new ransomware group. Despite its activities, the origins and organizational structure of the group remain unknown. According to data from the group’s DLS (data leak site), Cloak has accessed 23 databases of small-medium businesses, selling 21 of them so far. Out of these, 21 victims paid the ransom and had their data deleted, 1 declined and 1 is still in negotiations, indicating a high payment rate of 91-96%.

7 Ways to Jump-Start Your Incident Response

Recent research indicates that only 25% of organizations have incident response plans. Without such plans, companies are extremely susceptible to potential cyberattacks, and the stark business reality is that they take much longer to recover. Unfortunately, there are daily examples of major data breaches where a particular company’s incident response could have been managed more effectively.

Leading IT Outsourcing Companies With Cybersecurity Expertise 2025

If you think that outsourcing IT services is about cutting costs or scaling teams, then you are completely wrong. IT outsourcing is about finding partners you can trust with your most sensitive data. It is not enough to have talented developers in your team. You need engineers who build with security in mind from day one. That is why in 2025, businesses looking to outsource are prioritizing firms that bring both tech expertise and rock-solid cybersecurity practices.

Beyond the Clicks: Navigating Growth and Security in Crypto Traffic Strategy

Crypto platforms compete for attention in a space crowded with hype, volatility, and mistrust. Traffic generation plays a major role in platform growth, but the stakes are higher than they appear. Not all traffic is good traffic, and not all growth is safe.

Securing the Industrial Identity Fabric: Tackling Identity Risk in Global Manufacturing

As manufacturing environments become more interconnected and identity-driven, securing the industrial identity fabric is critical to operational resilience and cyber defense. In this 30-minute session, we explore why identity is now the new perimeter—especially in complex, hybrid OT/IT manufacturing ecosystems.

Human Risk Intelligence: Is Behavioural Data the New Defence?

Traditional security training doesn’t work. So how do we measure and manage the human element of cyber risk in a way that actually changes behaviour? In this episode of Razorwire, host James Rees speaks with Flavius Plesu, CEO of OutThink, to explore the evolution of human risk intelligence—a discipline using behavioural science and psychographic data to proactively reduce insider threats and strengthen organisational security from within.

Automating evidence collection for regulatory compliance: Tools & best practices

With mounting pressures from regulatory bodies, leaders face the dual challenge of maintaining audit readiness while streamlining processes to combat increasing administrative overhead. Automation is emerging as a strategic solution that not only addresses existing pain points but also transforms the enforcement of compliance into a proactive business function.

How LLMs Are Changing DLP, And Why That's a Good Thing

For years, data loss prevention has been synonymous with pain: These legacy approaches treat every potential incident the same, forcing teams to waste time deciphering what really happened and why it matters. Meanwhile, real risks slip through the cracks because no team can manually keep up.

SOC 2 complete guide

SOC 2 compliance is no longer a “nice to have” – it’s an essential requirement for SaaS providers and service organizations handling sensitive client data. Whether you’re a startup looking to build credibility or an established firm entering enterprise deals, SOC 2 offers a structured framework to demonstrate your commitment to security, privacy, and operational integrity.