Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is Residential Mental Health Treatment and How Does It Work?

When everyday life becomes too heavy and outpatient care isn't enough, residential mental health treatment can offer the support and structure needed to heal. It's more than just staying somewhere, it's a full-time, live-in program designed to help people work through mental health challenges in a safe, supportive setting. With 24/7 care, therapy sessions, and personalized plans, it provides a steady routine focused on recovery.

BlueVoyant Unveils New SBOM Capabilities as Part of Its Leading Third-Party Cyber Risk Management Solution

BlueVoyant's new Software Bill of Materials (SBOM) management offering, powered by SBOM leader Manifest, enables organisations to efficiently analyse and reduce third-party risks from commercial software.

Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for Non-Human Identities

Aembit, the workload identity and access management (IAM) company, today announced a major expansion of its platform to support Microsoft environments. With this launch, enterprises can now enforce secure, policy-based access for software workloads and agentic AI running on Windows Server, Active Directory, Microsoft Entra ID, and Azure - while extending that same access model to third-party clouds, SaaS tools, and partner environments.

Random but Memorable - Episode 15.0: 150th Episode Special

Random but Memorable turns 150! (It’s official, we’re old.) To celebrate, we play some special messages submitted by you – our listeners and customers – along with our own 1Password employees. We’re even sharing some crowdsourced 1Password tips for good measure. We also host a very special Archive Edition of Watchtower Weekly. We look back at some of the historic news stories we covered in 2018 and reflect on how the world of cybersecurity has changed.

DeepSight by Protecto: AI-Native Sensitive Data Detection for Developers

Thanks to a wide range of use cases that automate manual activities, enterprises are rushing to integrate GenAI into their IT stack, only to realize they’ve hit a privacy wall. A concerning number of use cases involve the use of sensitive data like PII and PHI, risking data privacy and compliance. Enterprises today are becoming increasingly aware of these multifaceted risks associated with unfiltered AI usage and turning to the common solution available in the market – AI privacy tools.

Building cybersecurity resilience through governance and assurance

Notis Iliopoulos from Obrela explains why it is time to move beyond checkbox compliance towards true operational resilience and provides advice on how to do it Managing cybersecurity risk exposure and ensuring compliance with evolving regulations has never been more complex or more critical. The rapid expansion of regulatory frameworks such as NIS2, DORA, and GDPR, to name a few, has forced organisations to rethink their approach to governance, risk and compliance (GRC).

From Metric to Mandate, How CIOs and CISOs Can Operationalize Microsoft Secure Score

This blog is the third part of our series on Microsoft Secure Score. Please read Part 1 and Part 2. As cyber risk escalates in complexity, the role of CIOs and CISOs has evolved far beyond IT governance. Today's security leaders are expected to deliver tangible risk reduction outcomes, maintain regulatory compliance, and support business continuity, often with constrained resources and growing accountability.