GRIP1 min read
Julie DiMauro26 min listen
GRIP1 min read
Despite advancements in leveraging cloud-based analysis for swift threat identification and response, the industry has largely stagnated in one critical area: true anomaly detection.
Marc Brown | Zayda Technologies3 min read
Threat actors obtained customer data by breaching the cloud environment of a former vendor.
Martina Lindberg2 min read
The US government wants to know through disclosures how technology is being protected from misuse by foreign adversaries.
Julie DiMauro1 min read
Gaurav Bhalla, a technology and data protection lawyer at Ahlawat & Associates, discusses data sovereignty and compliance.
Jean Hurley4 min read
Cyber Safety Review Board’s scathing report on intrusion of Microsoft systems by threat actor linked with China.
Thomas Hyrkiel, Julie DiMauro4 min read
US Homeland Security chief’s call for companies to bake stronger cybersecurity into products leads our infosec wrap.
Julie DiMauro2 min read
Dr Katarzyna Parchimowicz told GRIP about why the Digital Operational Resilience Act – DORA – is becoming applicable in 2025 and what it means for firms that could be designated as critical third party providers.
Carmen Cracknell37 min listen
Financial services take the lead with most widespread implementation of Zero Trust security initiatives.
Martina Lindberg3 min read