article
All Articles
TODAYBrowse all curated articles across categories
5 articles
security
When cloud logs fall short, the network tells the truth
Network Telemetry: The Reliable Alternative to Incomplete Cloud Logs
Bleeping Computer•THREATS3h
security
EU: NIS2 Update – EU Moves to Harmonise Cyber Controls, Refine Scope, and Add New In-Scope Entities
EU Proposes Amendments to NIS2 Directive for Enhanced Cybersecurity Harmonization
DLA Piper Privacy Matters•COMPLIANCE2d
security
China: New guidance on data transfer and identification of important data in the automotive sector
China Releases New Guidance on Automotive Data Transfer
DLA Piper Privacy Matters•COMPLIANCE1d
security
Microsoft SDL: Evolving security practices for an AI-powered world
Microsoft Enhances SDL for AI Security in a Cyberthreat Landscape
Microsoft Security Blog•M3652d
security
Safeguarding and Securing Cyberspace
CISA's New Strategies for Securing Cyberspace
CISA•THREATSover 14 years