Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Attacking the MCP Trust Boundary

Every secure API draws a line between code and data. HTTP separates headers from bodies. SQL has prepared statements. Even email distinguishes the envelope from the message. The Model Context Protocol (MCP), the fast-growing standard for connecting AI agents to external services, inherits that gap from the models it sits on top of.

Torq Leads Every Category in the 2026 KuppingerCole Analysts Leadership Compass: Emerging AI SOC

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo The security automation market just got its definitive evaluation and its new name. KuppingerCole Analysts is the global analyst firm that sets the benchmark for cybersecurity technology evaluations.

Vercel security incident: What the breach reveals about OAuth trust, supply chain risk, and response speed

Public reporting suggests the incident involved abuse of a third-party application that had been granted OAuth access to a Vercel employee account, enabling unauthorized access to some internal resources. Certain customer‑related tokens, environment variables, or other access artifacts may have been exposed, though Vercel has not stated that password theft was part of the initial access path.

CUI protection: Handling controlled unclassified information securely

Controlled unclassified information (CUI) protection requires consistent identification, marking, safeguarding, and access governance across every system that touches federal data. With CMMC Phase 1 underway and the FAR CUI rule in effect, compliance is now a contract prerequisite. Controlled unclassified information (CUI) is sensitive but unclassified information that requires safeguarding or dissemination controls under federal law, regulation, or government-wide policy.

NIST CSF 2.0 and Agentic AI: Building Profiles for Autonomous Systems

AI agents are likely already running inside your infrastructure. They triage alerts, remediate incidents, provision resources, and make decisions without waiting for a human to approve each step. For teams aligned to NIST’s Cybersecurity Framework (CSF) 2.0, this creates a problem: the framework assumes human actors, human-speed decisions, and human-readable audit trails. Autonomous systems break all three assumptions. The good news is that CSF 2.0 was designed to be adapted.

Your auditor is about to ask about AI agents. 9 things they'll want to see

Accelerating security solutions for small businesses‍ Tagore offers strategic services to small businesses. A partnership that can scale‍ Tagore prioritized finding a managed compliance partner with an established product, dedicated support team, and rapid release rate. Standing out from competitors‍ Tagore's partnership with Vanta enhances its strategic focus and deepens client value, creating differentiation in a competitive market. Studies show that AI adoption outpaces understanding.

Why Identity Security is Key To Managing Shadow AI

Employees are adopting Artificial Intelligence (AI) tools to enhance their productivity, but they rarely consider the security implications of doing so. When an employee pastes sensitive customer data into an unapproved AI tool, that data is processed by a third-party model outside the organization’s control, often leaving no audit trail for security teams to review.

Frontier AI Is Collapsing the Exploit Window. Here's How Defenders Must Respond.

The defensive timeline in cybersecurity is changing faster than most organizations are prepared for. For years, defenders operated with an assumption that there would be some delay between vulnerability disclosure and exploitation. That delay created a window for patching, mitigation, and detection. It wasn’t perfect, but it gave security teams time to act. Frontier AI is removing that buffer and changing how organizations must consider cyber risk.

AI Workload Security on GKE: Evaluating Google Cloud Native vs Third-Party Solutions

A CISO running AI agents on GKE has watched three Google product launches in eighteen months — Model Armor, expanded Security Command Center coverage for AI workloads, additions to Chronicle’s curated detection content — and is being asked whether the GCP-native stack is now sufficient. The vendor demos and the Google Cloud blog say yes. The 2 AM analyst experience says something different.

Emerging Threat: (CVE-2026-29145) Apache Tomcat Authentication Bypass

CVE-2026-29145 is an authentication bypass flaw in Apache Tomcat and Apache Tomcat Native affecting the CLIENT_CERT authentication path. When OCSP soft-fail is disabled, certain code paths fail to treat an OCSP check failure as a hard authentication failure, allowing a connecting client to reach protected resources without presenting a valid, revocation-checked certificate.