All Articles
TODAYBrowse all curated articles across categories
How to Build a High-Value Process Library for IT Service Management
Unlocking Value: Building a High-Value Process Library for ITSM Success
The 2026 ITSM Risks Leaders Are Underestimating
Navigating the Underestimated ITSM Risks of 2026
EU: NIS2 Update – EU Moves to Harmonise Cyber Controls, Refine Scope, and Add New In-Scope Entities
EU Proposes Amendments to NIS2 Directive for Enhanced Cybersecurity Harmonization
China: New guidance on data transfer and identification of important data in the automotive sector
China Releases New Guidance on Automotive Data Transfer
Microsoft SDL: Evolving security practices for an AI-powered world
Microsoft Enhances SDL for AI Security in a Cyberthreat Landscape
Detecting backdoored language models at scale
HIGHMicrosoft Unveils Scanner for Detecting Backdoored Language Models
DHS Holds Classified Briefing for Private Sector Election Companies
HIGHDHS Briefs Election Companies on Cyber Threats in Classified Meeting
Safeguarding and Securing Cyberspace
CISA's New Strategies for Securing Cyberspace
CRITICAL: Who Operates the Badbox 2.0 Botnet?
CRITKimwolf Botmasters Expose Badbox 2.0 Botnet Operations
Please Don’t Feed the Scattered Lapsus ShinyHunters
HIGHScattered Lapsus ShinyHunters: A New Threat in Data Ransom Tactics
Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends
HIGHInfy Hackers Evolve Tactics with New C2 Servers Post-Iran Blackout
The Buyer’s Guide to AI Usage Control
Navigating AI Usage Control in the Modern Enterprise