Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Medusa Ransomware: FBI and CISA Urge Organizations to Act Now to Mitigate Threat

The Medusa ransomware gang continues to present a major threat to the critical infrastructure sector, according to a newly-released joint advisory from the FBI, Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing and Analysis Center (MS-ISAC).

EP 3 - Building Trust in AI Agents

In this episode of the Security Matters podcast, host David Puner is joined by Lavi Lazarovitz, Vice President of Cyber Research at CyberArk Labs, to explore the transformative impact of AI agents on cybersecurity and automation. They discuss real-world scenarios where AI agents monitor security logs, flag anomalies, and automate responses, highlighting both the opportunities and risks associated with these advanced technologies.

Remote Work Security Threats and How to Stop Them

It’s safe to say that remote work is here to stay, and hybrid arrangements seem to be getting a boost in 2025. While flexible work models are highly desirable for employees, they create new cybersecurity challenges for businesses. Remote work has quickly become the norm, causing businesses to rethink security protocols. Implementing security measures outside of a centralized office requires a robust strategy—so how can you effectively mitigate risk while still ensuring operational efficiency?

How PCI DSS Compliance in Australia protects businesses from Data Breaches?

Did you know that there are approximately 12.52 million credit card users in Australia, along with 43.77 million actively issued debit cards? These figures reflect PCI DSS compliance in Australia’s heavy reliance on digital payments and card-based transactions for everyday purchases and online commerce. However, with this widespread adoption comes an equally significant risk which is the growing threat of data breaches and payment fraud.

Managing Cloud Exposures Just Got Easier: Introducing Nucleus Cloud-Native Vulnerability and Exposure Management

Every day, security teams are expected to manage risks in cloud environments that they don’t fully control, can’t always see, and that are constantly changing. Cloud-native assets—such as container workloads, autoscaling groups, and serverless functions—are highly dynamic, appearing, disappearing, and evolving in response to demand and functionality changes.

Core access: an analysis of the UK government's demand to Apple

On 7 February 2025, it was reported that the UK government had demanded that Apple allow access to encrypted user data worldwide. Under current security policies, only the account holder can access the stored data in Apple’s cloud services, meaning the technology organisation itself cannot view it.

Red Teaming for Generative AI: A Practical Approach to AI Security

Generative AI is changing industries by making automation, creativity, and decision-making more powerful. But it also comes with security risks. AI models can be tricked into revealing information, generating harmful content, or spreading false data. To keep AI safe and trustworthy, experts use GenAI Red Teaming. This method is a structured way to test AI systems for weaknesses before they cause harm.

Make PostgreSQL Access Easier and More Secure with Teleport

Managing PostgreSQL access is a pain for engineering teams. Setting up users, roles, and keeping track of permissions slows down engineers. Security risks may emerge in the form of shared admin accounts or missteps in user setup or authorization workflows. Check out this screenshot from a Reddit thread discussing this problem.

Responding and remediating: Best practices for handling security alerts

As organizations continue to evolve their DevSecOps programs by adopting comprehensive testing and monitoring, the next step is to take action on the insights uncovered. This means remediating security issues as early as possible and responding to security alerts and incidents in a timely manner. However, many security and development teams find that triaging the findings of every tool and managing remediation efforts is time-consuming and costly.