Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Full Lifecycle Imperative: Why "Shift Left" Must Meet "Shift Right"

In this series, we examined the vital connection between AI and APIs, highlighting what makes a leader in the API security market through the 2025 KuppingerCole Leadership Compass. Now, we turn to the core strategy of true API security: the full-lifecycle approach, where security is a continuous, integrated process rather than a single action.

Beyond the Breach: Why Continuous Automated Red Teaming (CART) is the Future of Cybersecurity

Security teams are under immense pressure. Traditional red teaming and annual penetration tests aren’t cutting it anymore. Breaches are no longer rare events; they’re expected. What matters now is what happens after the breach. Enter Continuous Automated Red Teaming (CART). CART is transforming how leading security teams approach validation, visibility, and readiness.

No More Blind Spots: Detecting WAF / CDN Control Bypass in IONIX Exposure Management

In today’s digital landscape, web application security is more critical than ever. Most organizations rely on Cloud-Based Security Providers offering integrated Web Application Firewalls (WAFs) and Content Delivery Networks (CDNs), for shielding their assets from direct exposure and attacks such as SQL injection, XSS, and DDoS.

Examples of AI Privacy Issues in the Real World

What’s the fastest way to lose trust? Expose private data. With AI moving from pilots to core workflows in support, finance, HR, and healthcare, one careless prompt or leaky integration can turn into headlines, fines, and weeks of incident response. The most useful way to understand the risks is to study AI privacy issues examples from the real world.

EMBER2024: Advancing the Training of Cybersecurity ML Models Against Evasive Malware

CrowdStrike data scientists are members of a team of cybersecurity researchers that recently released EMBER2024, an update to EMBER, the popular open source malware benchmark dataset originally released in 2018. The EMBER2024 dataset includes metadata, labels, and calculated features for over 3.2 million files from six different file formats.

The xAI Wake-Up Call: A CISO's Guide to Preventing Data Exfiltration

The recent lawsuit filed by xAI against former engineer Xuechen Li should serve as a critical wake-up call for every CISO. When a trusted engineer can allegedly download proprietary Grok IP, and jump to a competitor, it exposes fundamental gaps in how we protect our most valuable digital assets. This isn't just about one rogue employee. It's about the reality that your company's most sensitive data is at the risk of exfiltration every day—in laptops, SaaS and AI apps, endpoints and browsers.

Why Detection? Why Now? Key Takeaways from the NIST NCCoE Public COI Working Session

In April, I had the amazing opportunity to participate in a unique AI security event put on by the National Cybersecurity Center of Excellence (NCCoE). The April event was all about getting the community together to discuss what a Cyber AI Profile should look like as an overlay to the NIST Cybersecurity Framework (CSF) 2.0.

Salesloft Drift incident overview and CyberArk's response

It was recently reported that Salesloft’s Drift application was breached, allowing unauthorized access to its customers’ Salesforce data and affecting hundreds of organizations, including CyberArk. Upon learning of this incident, we quickly deployed threat containment measures, including terminating our Salesforce–Drift connection; disabling the Drift application and revoking all related user credentials; and rotating all Salesforce integration credentials.

Maximizing Your Security Investment with the Microsoft Azure Consumption Commitment (MACC)

If your organization has a Microsoft Azure Consumption Commitment (MACC), you’re already on the path to optimizing cloud spend. But are you making the most of it? MACC isn’t just a budgeting tool, it’s a strategic advantage. By transacting eligible solutions through the Azure Marketplace, you can decrement your commitment while accelerating your cloud security and operations. That’s where BlueVoyant comes in.