Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing System Prompt Hardening: production-ready protection for system prompts

Today, we’re launching System Prompt Hardening, Mend.io’s new capability that defends the hidden instructions that control how your AI systems behave. Unlike user-facing prompts, system prompts live behind the scenes, and when attackers manipulate them, the result can be data leaks, policy bypasses, or unsafe model behavior. System prompt hardening stops those attacks at the source and gives security, engineering, and risk teams a practical, auditable way to secure AI in production.

Connected Vehicles, Accelerating Risk: Inside the Cyber Threats Facing Automotive

The automotive industry is changing faster than ever, with smarter factories, connected vehicles, digital supply chains, and software-driven everything. But as the industry accelerates into this new era, something else is racing alongside it: cyber threats. Over the past year, Bitsight Threat Intelligence data has shown a sharp rise in ransomware activity targeting companies across the auto ecosystem. And what’s striking is how often the same names keep appearing.

Now Available: Cyberhaven's Free AI App Risk Checker

Most security teams are being asked to "enable AI" before they have any real sense of which tools are safe to use. That gap is costing them. Cyberhaven's research found that the majority of AI tools in active enterprise use today fall into high or critical risk categories, and more than 80% of enterprise data flowing into AI is going to those risky tools, not to platforms built with serious security in mind. To help security teams cut through the noise, we built the Cyberhaven AI App Risk Checker.

Managing CMMC Risk Throughout Your Contract Lifecycle

CMMC enforcement is here. With DFARS clauses 7021 and 7025 now active across the defense industrial base (DIB), contractors face enforceable obligations that extend beyond prime contractors to every tier of the supply chain. While primes have received significant attention, subcontractors encounter distinct challenges in managing CMMC risk from pre-award decisions through contract execution and ongoing compliance maintenance.

Why Cyber Security Budgets Fail

Organisations are investing heavily in cyber security, with global spending on cyber security products and services projected to reach approximately $213 billion in 2025 and expected to grow further to around $240 billion by 2026. Yet, a persistent paradox remains: despite escalating budgets, the threat landscape continues to evolve, and data breaches and cyber attacks are becoming more sophisticated and prevalent.

SOAR vs. AI SOC: The Category That Left SOAR Behind

If you’ve been in security operations for more than a few years, you’ve lived through the automation hype cycle at least twice. First, it was SIEM that was going to solve everything. Then SOAR was supposed to fix what SIEM couldn’t. Now, AI SOC platforms are delivering what SOAR always promised but never actually could.

What Frontier Models Can Actually Do in a SOC: Open-source Benchmark for Agentic SecOps Capabilities

Maxime Lamothe-Brassard, founder and CEO of LimaCharlie, sought answers on AI’s current capabilities in the SecOps space. Plenty of benchmarks exist to test AI's knowledge of cybersecurity, but none test whether a model actually does the work. There's a significant difference between an AI that can answer trivia questions about CVEs and one that can pick up an alert, investigate it, and produce an incident report.That gap matters more now than ever.

Why our AI world demands a remediation-first approach to exposure management

Editor's note: This guest article by Tanium Senior Sirector, Product Management, Julia Grunewald was originally published in SC Media Exposure management has emerged as a powerful alternative to traditional vulnerability management for good reason. A proactive, always‑on security discipline that continuously identifies an organization’s exposures and prioritizes them based on risk helps us know where to best focus our limited resources.

How Secure Share for Jira & Confluence Simplifies Atlassian Migration

Migrating from Atlassian Data Center (DC) to Cloud is a strategic move for many organizations. While migration brings scalability, flexibility, and cost benefits, it also introduces challenges, especially around secure external access, data sharing, and business continuity. This is where Secure Share for Jira and Confluence becomes a powerful ally.