Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Featured Post

Solving the Leadership Paradox to Avoid a Cybersecurity AI Skills Generation Gap

Transforming operations to embrace artificial intelligence (AI) is the leading challenge for organisations in every sector right now. Arguably, urgency is even greater in the technology sector, where leaders are acutely aware of AI's potential to boost productivity and efficiency. In the cybersecurity subset of technology, the drive is stronger still, as vendors seek to mitigate AI-accelerated cyberattacks and help customers react faster, protect better, and achieve more with the limited budgets that characterise today's economy.

The Floor Was Selling AI. The Hallways Were Asking for Help.

One man’s perspective on RSA 2026 and what the AI agent security market actually looks like up close. Every year at RSA, there's a theme, not the official one printed on the lanyards, but the real one. The one that shows up in every booth conversation, every hallway argument, every dinner where people finally say what they wouldn't say on a panel. A few years back, it was cloud. Then zero trust took over and held the room for a while. XDR came through and confused everyone. Identity had its moment.

AI Models Won't Pick Sides in the Security War. Governance and Policy Will.

Two significant software supply chain cybersecurity attacks, seven days apart, with one hundred and eighty million weekly downloads between them. The chaos from development teams to the boardroom is real. And the pace is only going to get faster. Much, much faster…

AI With Intention: Visibility Drives Action: Strengthening Cyber Risk Management with Better Data

As organizations shift to cloud services and third-party vendors, maintaining visibility and control over cyber risk has become increasingly complex. In this video, we explore one of the biggest challenges facing security leaders today: how to manage cyber risk without full visibility into your environment. Learn why visibility is critical to effective cybersecurity—and how the right data enables organizations to.

CMMC Requirements for AI Systems: What Assessors Actually Look For

Josh Rector is the Compliance Director, Public Sector at Ace of Cloud, a security and compliance consulting firm, certified CMMC Third-Party Assessor Organization (C3PAO), and Registered Provider Organization (RPO). With more than a decade of experience in cybersecurity compliance, he has worked both sides of the assessment table, leading internal and external assessments, serving as ISSO for systems at federal agencies, and guiding cloud service providers through the FedRAMP authorization process.

Scaling Reach Security the Right Way

New year, new faces, big goals. To close out 2025 and open 2026, we welcomed 43 new team members across engineering, sales, customer success & solutions, marketing, and operations. Reach was founded to close the gap between knowing where you're exposed and actually fixing it. That mission doesn’t scale without the right people. Growth is exciting, but aligned growth—with the right people, at the right time, for the right mission—is what really matters.

Optimize Microsoft Defender for Office 365 Controls | Demo Video

Microsoft Defender for Office 365 protects against phishing, malware, and malicious links across email and collaboration tools. But as environments scale and settings are changed, your Defender security controls can drift away from security baselines and degrade your security posture. Reach continuously analyzes your Defender deployment to find and fix misconfigurations, activate unused capabilities, and stop configuration drift.

10 Hidden Cybersecurity Misconfigurations

In 2025, organizations spent billions on security, deploying EDR/XDR, SASE, firewalls, identity platforms, email security, web security, and more. And yet, breaches persist. The reason often is not a zero-day, an advanced persistent threat, or a cutting-edge exploit. It is far more mundane. Misconfigurations across identity, endpoint, network, and email/web security controls remain among the top root causes of incidents.

Codex API In DevSecOps: Balancing Developer Speed With Secure Code Review

AI-assisted coding is no longer a side experiment. It is becoming part of daily engineering workflows, from drafting functions and refactoring legacy code to generating tests and accelerating routine implementation work. That shift is why the Codex API now belongs in a broader DevSecOps conversation, not just a developer productivity discussion.