All The Latest!
Keeping up with cyber-news is hard. Enjoy our specially curated collection of various RSS feeds to help make finding relevant news a little less tedious. If you have something to share, be sure to let us know!
Keeping up with cyber-news is hard. Enjoy our specially curated collection of various RSS feeds to help make finding relevant news a little less tedious. If you have something to share, be sure to let us know!

Why? What is our desired outcome? Such a simple question. Such a profound question. I’ve been contemplating writing this post for a while now, but struggled with the framing. Throughout 2025 I start …
Contributed by Tata Communications. Originally published on Business Today. A decade ago, moving to the cloud was seen as a simple upgrade to help companies work faster, scale easily and reduce costs. …
AI is transforming business operations, offering unprecedented productivity, faster decision-making, and new competitive edges. As per Gartner, by 2028, more than 95% of enterprises will be using gene …
You probably weren’t using it anyway, so might as well cut the cruft and end a lesser-known attack vector. I’m a bit late to the party, but this morning I learned that AWS is ending support for a feat …
Part 1 of 7 in the CSA Series: AI and the Zero Trust Transformation The security landscape has shifted beneath our feet. Generative AI hasn't just added new tools to the defender's arsenal …
A virtual firewall is a firewall device or service that provides network traffic filtering and monitoring for virtual machines (VMs) in a virtualized environment.
The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the use of cloud technologies to secure other forms of computi …
If your company is using a cloud database, it's critical to stay on top of security. Review the security features offered by top cloud providers, plus some best practices.
A cloud audit is an assessment of a cloud computing environment and its services, based on a specific set of controls and best practices.
SOC 2 (System and Organization Controls 2), pronounced "sock two," is a voluntary compliance standard for ensuring that service providers properly manage and protect the sensitive data in th …
It all sounds pretty dystopian: Inside a white stucco building in Southern California, video cameras compare faces of passersby against a facial recognition database. Behavioral analysis AI reviews th …
More than a decade after Aaron Swartz’s death, the United States is still living inside the contradiction that destroyed him. Swartz believed that knowledge, especially publicly funded knowledge, shou …
This isn’t good: We discovered a critical vulnerability (CVE-2026-21858, CVSS 10.0) in n8n that enables attackers to take over locally deployed instances, impacting an estimated 100,000 servers global …