Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Gain Visibility and Reduce Exposure with Aurora Attack Surface Management

This demo will illustrate how Aurora Attack Surface Management builds a continuously updated attack surface inventory, correlates asset and exposure data from multiple sources, and identifies gaps in security controls. It enables prioritization and remediation verification so that organizations can focus on what matters most and effectively drive risk reduction.

Acronis Cyber Frame - Setting up VPN connection to your local site

Learn how to connect to Acronis Cyber Frame virtual machines and set up a secure site-to-site VPN using strongSwan. This video walks you through network setup, router configuration, VPN policies, endpoint creation, and testing connectivity between Cyber Frame and your local site.

How Corelight identified a years-old network issue in 30 minutes

A global cruise line operating across maritime and resort environments was struggling with inconsistent detections, alert overload, and limited visibility from its existing NDR platform. In this customer story, Jay Miller from Corelight walks through how the organization evaluated its network visibility strategy, identified long-standing gaps in detection coverage, and improved investigation workflows across a complex environment with intermittent connectivity at sea.

Fireblocks CEO Michael Shaulov on NYSE Live: Powering Western Union's USDPT Stablecoin

Fireblocks Co-Founder and CEO Michael Shaulov joined NYSE Live to discuss the partnership powering Western Union's first stablecoin, USDPT, and what it signals for the next wave of institutional digital asset adoption. In this conversation with NYSE's Ashley Mastronardi, Michael covers: Fireblocks supports $14T+ in digital asset transactions across 150+ blockchains and powers the infrastructure behind payment giants, banks, and exchanges modernizing how money moves.

NIST's NVD Shift Changes the Rules for Vulnerability Management

NIST’s recent update to the National Vulnerability Database (NVD) marks a turning point for enterprise vulnerability management teams. It’s not broken; it hit scale limits that NIST was forced to address. Now, every vulnerability management program built around it has a problem.

HIPAA Compliance for Healthcare SaaS in Singapore

Rate this post Last Updated on May 11, 2026 by Narendra Sahoo Contents hide HIPAA Doesn’t Stop at the US Border Compliance by Design: Why Architecture Trumps Policy The Three Security Rule Safeguard Categories Engineering HIPAA Technical Controls Multi-Tenancy, Breach Notification, and Cross-Border Governance Cloud Security Operations: Keeping HIPAA Controls Alive The AI-Cloud Blueprint: HIPAA-Compliant AI in 2026 Frequently Asked Questions Conclusion: Build Compliance Into the Code.