<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Zerberus Technologies Ltd]]></title><description><![CDATA[Zerberus automates compliance for ISO27001, PCI &amp; GDPR standards.Protect your business against cyber risks with continuous monitoring while focusi]]></description><link>https://www.zerberus.ai/blog</link><generator>RSS for Node</generator><lastBuildDate>Thu, 16 Apr 2026 23:40:54 GMT</lastBuildDate><atom:link href="https://www.zerberus.ai/blog-feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[The 2026 Cryptographic Cliff: Why Your Codebase Needs an Audit-Ready CBOM Today]]></title><description><![CDATA[The year 2026 has marked a fundamental shift in the digital landscape. We are no longer living in the "wait and see" era of cybersecurity. Between the finalisation of NIST’s Post-Quantum Cryptography (PQC)  standards and the strict enforcement of the EU Cyber Resilience Act (CRA) , the industry has hit a regulatory and technical "cliff". For the modern developer, the message is clear: if you cannot map, measure, and prove the strength of your encryption, you are building on borrowed time. At...]]></description><link>https://www.zerberus.ai/post/the-2026-cryptographic-cliff-why-your-codebase-needs-an-audit-ready-cbom-today</link><guid isPermaLink="false">69db8216515c02011a111543</guid><pubDate>Sun, 12 Apr 2026 12:34:34 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8d03a4_db821419c67748aa91571c173430b3e3~mv2.jpg/v1/fit/w_1000,h_768,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item><item><title><![CDATA[NCSC 2026 AI Guidelines: Is Your Enterprise Prepared for the £65 Breach?]]></title><description><![CDATA[The End of "Security by Obscurity" The barrier to entry for devastating cyberattacks has officially collapsed. According to the NCSC’s 2026 Frontier AI Assessment , the cost of orchestrating a sophisticated, multi-step enterprise breach has plummeted to just £65 , less than a standard business lunch. As "Promptware" replaces traditional malware, the UK’s primary cyber authority is sounding the alarm: traditional internal guardrails are no longer sufficient. We are entering an era where AI...]]></description><link>https://www.zerberus.ai/post/ncsc-2026-ai-guidelines-is-your-enterprise-prepared-for-the-65-breach</link><guid isPermaLink="false">69d93c7075afb0779a6f930a</guid><pubDate>Fri, 10 Apr 2026 18:27:42 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8d03a4_c84916747e4348a5b643dc5d2e46a0d6~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item><item><title><![CDATA[Analyzing the Axios Supply Chain Compromise and Its Impact on Infrastructure Trust and JavaScript Ecosystems]]></title><description><![CDATA[The recent compromise of the AXIOS JavaScript library has exposed critical vulnerabilities in the software supply chain, raising urgent questions about the trustworthiness of modern infrastructure and the fragility of open source ecosystems. This incident highlights how deeply interconnected and dependent organisations are on third-party components, particularly in popular package managers such as NPM and PyPi. Our security research team has conducted a thorough analysis of the AXIOS supply...]]></description><link>https://www.zerberus.ai/post/analyzing-the-axios-supply-chain-compromise-and-its-impact-on-infrastructure-trust-and-javascript-ec</link><guid isPermaLink="false">69cd2e22cf5ec76e29706841</guid><pubDate>Thu, 02 Apr 2026 11:08:28 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8d03a4_a5337a362469455a9002e89017e2b521~mv2.png/v1/fit/w_1000,h_768,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item><item><title><![CDATA[Is Fast Compliance Compromising Security and Trust in the SaaS Industry]]></title><description><![CDATA[If compliance can be done in two weeks, what exactly is being validated? This question is more than rhetorical. It strikes at the heart of a growing problem in the SaaS industry: the rush to tick boxes and generate certificates without truly securing systems. Recent controversies around compliance startups have exposed cracks in the foundation of “fast compliance” platforms. These issues go beyond individual companies and point to systemic flaws that every SaaS founder, CTO, and security...]]></description><link>https://www.zerberus.ai/post/is-fast-compliance-compromising-security-and-trust-in-the-saas-industry</link><guid isPermaLink="false">69bfe2400160b7de3150c68c</guid><pubDate>Sun, 22 Mar 2026 13:37:55 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8d03a4_17c3b92528d84d5e9f10e484f0407ba6~mv2.png/v1/fit/w_1000,h_768,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item><item><title><![CDATA[How AI Startups Can Safeguard Their Workflows with RAGuard and Enjoy a Free Trial]]></title><description><![CDATA[Artificial intelligence native startups face unique challenges when building and scaling AI-powered applications. As these startups rely heavily on large language models (LLMs), retrieval-augmented generation (RAG) pipelines, and model-centric platforms (MCP), they must protect their workflows from evolving security threats without slowing down innovation. RAGuard offers a practical solution designed specifically for AI native companies, providing enterprise-grade security with minimal...]]></description><link>https://www.zerberus.ai/post/how-ai-startups-can-safeguard-their-workflows-with-raguard-and-enjoy-a-free-trial</link><guid isPermaLink="false">699d72fb82d12811b4b743ca</guid><pubDate>Tue, 24 Feb 2026 22:16:17 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8d03a4_df155c9bc39740cc88a3098b61e02523~mv2.png/v1/fit/w_1000,h_768,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item><item><title><![CDATA[The Ghost in the Machine: Why Your IDE’s Recommendations Are the Next Supply Chain Attack Surface]]></title><description><![CDATA[1. A Quiet Near-Miss in the Software Supply Chain In January 2026, the security community caught a glimpse of the future of software supply chain attacks. It was not a zero-day exploit, a malicious dependency, or a leaked signing key. It was something far more mundane, and far more dangerous: a name. Koi Security  disclosed a subtle but serious weakness affecting several popular AI-powered IDEs, including Cursor, Windsurf, and Google Antigravity. These tools inherit Visual Studio Code’s...]]></description><link>https://www.zerberus.ai/post/the-ghost-in-the-machine-why-your-ide-s-recommendations-are-the-next-supply-chain-attack-surface</link><guid isPermaLink="false">698879ea0c9b54090fe25c6e</guid><pubDate>Sun, 08 Feb 2026 19:19:00 GMT</pubDate><enclosure url="http://youtu.be/flunt4GBhus" length="0" type="video"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item><item><title><![CDATA[Conducting a Comprehensive Vulnerability Assessment Process]]></title><description><![CDATA[In today’s digital landscape, organisations face an ever-growing array of cyber threats. To protect sensitive data and maintain operational integrity, it is essential to conduct a thorough vulnerability assessment process. This process helps identify weaknesses in systems, networks, and applications before attackers can exploit them. Understanding how to perform a comprehensive vulnerability assessment is a critical step in strengthening your cybersecurity posture. Understanding the...]]></description><link>https://www.zerberus.ai/post/conducting-a-comprehensive-vulnerability-assessment-process</link><guid isPermaLink="false">697088c10091b2d3bec42692</guid><pubDate>Wed, 21 Jan 2026 15:48:06 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8d03a4_12c15b2f9ef64d47bfd992552bf3e74c~mv2.png/v1/fit/w_1000,h_768,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item><item><title><![CDATA[The Persistence Problem: Why Agentic AI Demands a New Security Paradigm]]></title><description><![CDATA[The Industry Is Solving the Wrong AI Threats The industry is focused on blocking the wrong failures. While most AI security efforts concentrate on filtering toxic outputs and preventing obvious misuse, a far more dangerous class of risk is quietly emerging: instruction persistence . During a recent enterprise AI safety evaluation, we observed how a single, seemingly legitimate interaction could introduce instructions that persisted over time. These instructions shaped behaviour well beyond...]]></description><link>https://www.zerberus.ai/post/the-persistence-problem-why-agentic-ai-demands-a-new-security-paradigm</link><guid isPermaLink="false">696b70b13d420427946984fc</guid><pubDate>Sat, 17 Jan 2026 11:29:35 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8d03a4_e2ef385c3f4b428192f640af30291b05~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item><item><title><![CDATA[6 Best Compliance Tools in the UK for 2026: Your Complete Guide]]></title><description><![CDATA[Finding the best compliance tool for your UK business can be challenging. With regulations constantly evolving and enforcement becoming stricter, organisations need robust solutions to manage their compliance obligations effectively. This comprehensive guide explores the top six compliance management platforms available in the UK market today. ]]></description><link>https://www.zerberus.ai/post/6-best-compliance-tools-in-the-uk-for-2026-your-complete-guide</link><guid isPermaLink="false">69443b8e142838fcf0651789</guid><category><![CDATA[Guides]]></category><pubDate>Mon, 22 Dec 2025 11:38:25 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/5c5621_8397d72589ef4adcb916139a9cfdbb9e~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Debadrita Banik</dc:creator></item><item><title><![CDATA[OneTrust Sale Rumours: Have Smart Teams Already Planning Their Switch]]></title><description><![CDATA[For the past decade, privacy and compliance teams have relied on OneTrust as the “safe” enterprise default. It wasn’t perfect - complex, heavy, often slow - but it was predictable. Trusted. Stable. That stability is now in question. Rumors of a OneTrust sale to private equity aren’t just industry noise—they are a turning point. When the largest player in privacy operations enters a consolidation cycle, it signals something bigger:  the end of the one-size-fits-all privacy suite era, and the...]]></description><link>https://www.zerberus.ai/post/onetrust-sale-rumours-have-smart-teams-already-planning-their-switch</link><guid isPermaLink="false">6929a0f4d73b496b537de35d</guid><pubDate>Wed, 03 Dec 2025 16:42:46 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/587d5d_3042c6b29e4a4eed90a47f721ffe19c0~mv2.png/v1/fit/w_1000,h_672,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Aravintharaj G</dc:creator></item><item><title><![CDATA[Transitioning to Guardianship in AI Security: A New Era of Assurance]]></title><description><![CDATA[Artificial intelligence is shifting from passive prediction engines to agentic , autonomous systems  that reason, coordinate, and act across digital environments. These systems do not wait for instructions. They interpret goals, make decisions, invoke tools, and interface with critical infrastructure . Yet, the security approach used for this new intelligence remains anchored in the past. The Limitations of Traditional Security Approaches Today’s industry still relies on static guardrails ...]]></description><link>https://www.zerberus.ai/post/guardianship-not-guardrails-how-zerberus-is-engineering-the-next-era-of-agentic-ai</link><guid isPermaLink="false">691e115cf9f8bb90ab78aa28</guid><category><![CDATA[Guides]]></category><category><![CDATA[Opinion piece]]></category><pubDate>Wed, 19 Nov 2025 22:36:07 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8d03a4_84b0c463df9c402184ce06de65024c49~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item><item><title><![CDATA[EU Cyber Resilience Act (CRA) Compliance Guide: Part II]]></title><description><![CDATA[The EU Cyber Resilience Act transforms open-source and firmware security from voluntary practice to legal requirement. By December 2027, every organization building digital products must prove components are secure, traceable, and continuously maintained. SBOMs become mandatory under Article 10, firmware vulnerabilities must be disclosed to ENISA within 24 hours, and secure-by-design principles must be embedded across CI/CD pipelines. Compliance is now a competitive advantage.]]></description><link>https://www.zerberus.ai/post/eu-cyber-resilience-act-cra-compliance-guide-part-ii</link><guid isPermaLink="false">68fe5558064dd83bede3eb62</guid><category><![CDATA[Cyber Resilience Act]]></category><pubDate>Thu, 06 Nov 2025 23:00:00 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/5c5621_5217db95d50e4c21a263f0c5cb213770~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item><item><title><![CDATA[ISO 42001 Implementation: A 2026 Step-by-Step Guide for UK and EU Organisations]]></title><description><![CDATA[Get a detailed step by step guidance of how to implement ISO 42001 if you're a UK or EU organisation. ]]></description><link>https://www.zerberus.ai/post/iso-42001-implementation-a-2026-step-by-step-guide-for-uk-and-eu-organisations</link><guid isPermaLink="false">69034f2090a531c250f09304</guid><category><![CDATA[ISO 42001]]></category><pubDate>Mon, 03 Nov 2025 17:35:37 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/5c5621_365191cff0114e71a686354717b19b68~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Debadrita Banik</dc:creator></item><item><title><![CDATA[Decoding the EU Cyber Resilience Act (CRA) : Part 1]]></title><description><![CDATA[The EU Cyber Resilience Act, enforceable December 2027, transforms cybersecurity from voluntary guidance to binding law. It mandates SBOMs, 24-hour vulnerability reporting to ENISA, and secure-by-design principles for all digital products sold in the EU. Penalties reach €15M or 2.5% of global turnover. Together with EO 14028 and NIST CSF 2.0, these frameworks make supply-chain transparency the new baseline for market access and customer trust.]]></description><link>https://www.zerberus.ai/post/blog-eu-cyber-resilience-act-overview</link><guid isPermaLink="false">68fe3d2049fb0f7021624a54</guid><category><![CDATA[Cyber Resilience Act]]></category><pubDate>Sun, 26 Oct 2025 16:46:41 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/5c5621_0cbbe482283842c4b648575220271432~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item><item><title><![CDATA[ISO 42001 for SaaS Startups: How to Build Trust, Win Deals, and Stay Ahead in the AI Governance Era]]></title><description><![CDATA[Introduction: The New Frontier of AI Governance Artificial intelligence is no longer an experimental feature; it’s at the core of how modern SaaS companies compete. But as AI scales across products, so does scrutiny — from regulators, customers, and investors alike. The new ISO 42001 standard has emerged as the first global AI management system framework . It’s the ISO 27001 moment for AI, setting the foundation for responsible, transparent, and auditable AI governance . For SaaS startups,...]]></description><link>https://www.zerberus.ai/post/iso-42001-for-saas-startups-how-to-build-trust-win-deals-and-stay-ahead-in-the-ai-governance-era</link><guid isPermaLink="false">68f79365c9a84e796d0f4c44</guid><pubDate>Tue, 21 Oct 2025 16:30:43 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8d03a4_870c536f8283442fa91e8fab6a35c33d~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item><item><title><![CDATA[Resilient by Design: Why Zerberus Survives What Brought AWS Down]]></title><description><![CDATA[ Updated 21 October 2025, 17:20 BST    Developing incident: AWS continues gradual recovery across its US-EAST-1 region following widespread DNS degradation affecting DynamoDB, EC2, and Lambda. The AWS Outage 2025: What Actually Happened At 12:11 AM PDT  on 20 October 2025, Amazon Web Services confirmed an “operational issue” in its US-EAST-1 (Northern Virginia)  region. The root cause was a DNS resolution failure  within DynamoDB , cascading to services such as EC2, Lambda, RDS, Glue,...]]></description><link>https://www.zerberus.ai/post/resilient-by-design-why-zerberus-survives-what-brought-aws-down</link><guid isPermaLink="false">68f661d604b472953c795111</guid><category><![CDATA[Opinion piece]]></category><pubDate>Mon, 20 Oct 2025 20:27:42 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8d03a4_a44cc9ce1abe4930b8aa9bc0dbf7690a~mv2.png/v1/fit/w_1000,h_847,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item><item><title><![CDATA[AI Compliance and Software Supply Chain Security: The Trace-AI Metadata Model]]></title><description><![CDATA[The Compliance Blind Spot in the AI Era Artificial intelligence has revolutionized how we build software, but the tools we use to prove it’s secure are stuck in the past. Today’s applications are complex assemblies of pre-trained models, microservices, and countless open-source dependencies. While this accelerates innovation, it also creates a critical challenge for software supply chain security :  how do you secure what you can't see? Traditional vulnerability scanners were not built for...]]></description><link>https://www.zerberus.ai/post/ai-compliance-and-software-supply-chain-security-the-trace-ai-metadata-model</link><guid isPermaLink="false">68e6535c3af439b9bda83345</guid><category><![CDATA[Supply chain security]]></category><pubDate>Wed, 08 Oct 2025 15:10:18 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8d03a4_e78878a4455e4702a7f2730a6db28662~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item><item><title><![CDATA[Complete Guide to Security Questionnaire Automation in 2025]]></title><description><![CDATA[Discover how questionnaire automation transforms security assessments in 2025. Reduce completion time by 85-90% with AI-powered platforms. Learn implementation strategies, essential features, and best practices for automating security questionnaires while improving accuracy and freeing your team for strategic work.]]></description><link>https://www.zerberus.ai/post/complete-guide-to-security-questionnaire-automation-in-2025</link><guid isPermaLink="false">68e35c4d3af439b9bda22e57</guid><category><![CDATA[Guides]]></category><pubDate>Tue, 07 Oct 2025 12:08:51 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/5c5621_87d1b8c28aa24a67848a304e673509ef~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Debadrita Banik</dc:creator></item><item><title><![CDATA[How to Automate EU Cyber Resilience Act Compliance in Your CI/CD]]></title><description><![CDATA[Meet EU CRA SBOM Requirements and Prepare for the UK Cyber Security and Resilience Bill, Without Slowing Engineers Why This Matters Now The EU Cyber Resilience Act compliance  bar is rising for anyone shipping software. UK organisations face comparable duties under the Cyber Security and Resilience Bill . If you deliver via CI/CD, you will need machine-readable SBOMs, lifecycle vulnerability handling, and audit-ready evidence that does not throttle delivery. This guide shows how Trace‑AI ...]]></description><link>https://www.zerberus.ai/post/how-to-automate-eu-cyber-resilience-act-compliance-in-your-ci-cd</link><guid isPermaLink="false">68cd2689860daee44b31f0a6</guid><category><![CDATA[Supply chain security]]></category><pubDate>Sat, 20 Sep 2025 07:01:10 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8d03a4_836c0dd17183434b861b46196b76baeb~mv2.png/v1/fit/w_566,h_404,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item><item><title><![CDATA[From SBOM to ZSBOM: Why Metadata-First Risk Classification Matters]]></title><description><![CDATA[Why Today’s SBOMs Aren’t Enough Every major breach in the last five years has one thing in common: the attackers didn’t break through the front door, they slipped in through dependencies. That’s why governments rushed to make Software Bills of Materials (SBOMs)  mandatory. From the Cyber Resilience Act (CRA)  in Europe to Executive Order 14028  in the United States, SBOMs are now table stakes for selling software. But here is the problem: most SBOMs are glorified spreadsheets.  They generate...]]></description><link>https://www.zerberus.ai/post/from-sbom-to-zsbom-why-metadata-first-risk-classification-matters</link><guid isPermaLink="false">68cd19c7aef6910f9dd5ae43</guid><category><![CDATA[Supply chain security]]></category><pubDate>Fri, 19 Sep 2025 09:01:23 GMT</pubDate><enclosure url="http://video.wixstatic.com/video/8d03a4_063a8527009a492d8fc295cd3f3dd854/480p/mp4/file.mp4" length="0" type="video"/><dc:creator>Ramkumar Sundarakalatharan</dc:creator></item></channel></rss>