radar

ONE Sentinel

article

All Articles

TODAY

Browse all curated articles across categories

52 articles
dns

How to Build a High-Value Process Library for IT Service Management

Unlocking Value: Building a High-Value Process Library for ITSM Success

ITSM.toolsINCIDENT MANAGEMENT2d
dns

The 2026 ITSM Risks Leaders Are Underestimating

Navigating the Underestimated ITSM Risks of 2026

ITSM.toolsINCIDENT MANAGEMENT1d
security

EU: NIS2 Update – EU Moves to Harmonise Cyber Controls, Refine Scope, and Add New In-Scope Entities

EU Proposes Amendments to NIS2 Directive for Enhanced Cybersecurity Harmonization

DLA Piper Privacy MattersCOMPLIANCE2d
security

China: New guidance on data transfer and identification of important data in the automotive sector

China Releases New Guidance on Automotive Data Transfer

DLA Piper Privacy MattersCOMPLIANCE1d
security

Microsoft SDL: Evolving security practices for an AI-powered world

Microsoft Enhances SDL for AI Security in a Cyberthreat Landscape

Microsoft Security BlogM3652d
security

Detecting backdoored language models at scale

HIGH

Microsoft Unveils Scanner for Detecting Backdoored Language Models

Microsoft Security BlogM3651d
security

DHS Holds Classified Briefing for Private Sector Election Companies

HIGH

DHS Briefs Election Companies on Cyber Threats in Classified Meeting

CISATHREATSover 7 years
security

Safeguarding and Securing Cyberspace

CISA's New Strategies for Securing Cyberspace

CISATHREATSover 14 years
security

CRITICAL: Who Operates the Badbox 2.0 Botnet?

CRIT

Kimwolf Botmasters Expose Badbox 2.0 Botnet Operations

Krebs on SecurityTHREATS10d
security

Please Don’t Feed the Scattered Lapsus ShinyHunters

HIGH

Scattered Lapsus ShinyHunters: A New Threat in Data Ransom Tactics

Krebs on SecurityTHREATS3d
security

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

HIGH

Infy Hackers Evolve Tactics with New C2 Servers Post-Iran Blackout

The Hacker NewsTHREATS7h
security

The Buyer’s Guide to AI Usage Control

Navigating AI Usage Control in the Modern Enterprise

The Hacker NewsTHREATS6h