Shadow AI - The Darker Side of AI Awesomeness

Shadow AI - The Darker Side of AI Awesomeness

The year 2018 was a watershed moment in the evolution of Large Language Models (LLMs), with the arri ...

Bridging The Gap : IT and OT Compliance Collaboration

Bridging The Gap : IT and OT Compliance Collaboration

The Historical IT/OT Divide Operational Technology (OT) and Information Technology (IT) have his ...

Dissecting a Cyber Attack With a Perspective on Compliance

Dissecting a Cyber Attack With a Perspective on Compliance

A website breach We recently came across an interesting case with one of our EAP (Early Access P ...

Hidden Cybersecurity Risks in Hospitals from Unpatched Medical Devices

Hidden Cybersecurity Risks in Hospitals from Unpatched Medical Devices

A Silent Threat in the Healing Environment Hospitals, dedicated to healing, face a hidden risk a ...

SlopSquatting- A New Dimension to Supply-Chain Attacks

SlopSquatting- A New Dimension to Supply-Chain Attacks

Supply chain has been a prominent threat vector used in cyber-attacks. From the infamous SolarWinds ...

MITRE CVE - Is Your GRC Ready for a World Without a Stable CVE?

MITRE CVE - Is Your GRC Ready for a World Without a Stable CVE?

A Close Call for the Cybersecurity Industry Last week, the cybersecurity industry faced a huge r ...