Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hybrid visibility done right: Visualize, monitor, and correlate your VPCs, Subnets, EC2, ECS, and RDS services with AWS Cloud Observability in DDI Central

Every enterprise today runs on two kinds of infrastructure. One half lives on-premises: the company’s data centers, internal networks, DNS zones, DHCP scopes, IP address spaces, and the systems that help every device find and connect to the right service. The other half lives in the public cloud: where applications, databases, containers, and storage run on infrastructure delivered by providers like Amazon Web Services (AWS). This hybrid model is no longer a temporary phase.

Plenary Session on Data Protection in the Age of AI at CII CIO Awards & Conclave

In this panel discussion titled "Data Protection in the Age of AI" Our Founder & CEO Mr. Anirban Mukherji along with several distinguished speakers, focused on critical aspects of data privacy and cybersecurity. The session explored how artificial intelligence impacts data management and the necessity of robust data privacy and security measures. Experts discuss the importance of responsible AI practices to navigate the evolving digital landscape effectively.

From Cyberwar to Cognitive Warfare: The Geopolitical Impact on Cybersecurity in Africa

We’ve long defined cybersecurity as the technical discipline of protecting networks, data and systems. But when viewed through a geopolitical lens, then this definition is no longer sufficient. What we are dealing with today goes beyond protecting organisational data, to protecting economies, sovereignty, and increasingly, human perception.

You Have 60 Seconds to Stop the Breach. Are You Ready?

2026 has officially become the year of speed, scale and support The delta between a phishing email landing and a full organizational compromise has shrunk to mere seconds. The reality by the numbers: To close this window, your defense strategy must evolve into a two-step powerhouse of accuracy and automation.

PCI DSS vs SOC 2: Which Do You Need?

With so many different security frameworks and standards that apply to different industries and businesses, it can be difficult to even know where to begin. Which ones do you need to use, at what levels, and when? Two frameworks in particular are closely related and important for many businesses, and thus are the cause of a lot of confusion. We wanted to address that confusion today. Those two are PCI DSS and SOC 2.

How to Reduce Time-to-Detect Fraud: Why Most Teams Are Already Too Late

ATO fraud cost US adults $15.6 billion in 2024, yet most fraud teams are still measuring detection time from the moment an alert fires, not from the moment an attacker starts building infrastructure. That gap is where the damage happens. To reduce time to detect fraud, teams need to move detection upstream, to Stage 1 and Stage 2 of the fraud lifecycle, before phishing sites go live and before a single credential is submitted. Faster transaction monitoring won’t close this gap.

Cyberhaven Analyst Plugin: AI-Assisted Security Investigation in Claude Code and Codex

Security teams have a data problem. Not a shortage of data, but instead there is a growing data surfacing problem. The signals are there, the incidents are logged, and the classifications exist. But, getting from raw data to a prioritized action plan still requires close to an hour of manual querying, tab-switching, and context reconstruction, every single time. The Cyberhaven Analyst Plugin changes that.

How to Monitor MCP Usage: A 10-Step Security Checklist for 2026

What you need to know: MCP can evade traditional DLP, IAM, and SIEM controls because agent traffic looks like authorized API calls, sensitive data is semantically transformed before it leaves the perimeter, and exfiltration happens through tool invocations rather than file transfers.

CVE-2026-23918: Apache HTTP/2 Double-Free Vulnerability with Possible RCE

A high-severity double-free vulnerability in Apache HTTP Server 2.4.66 allows low-privileged attackers to remotely crash vulnerable servers through a crafted HTTP/2 request sequence, with a demonstrated path to remote code execution on common Linux deployments. Tracked as CVE-2026-23918, the vulnerability exists in Apache’s mod_http2 module and affects deployments using multi-threaded MPMs such as worker and event.