Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

When Your Friend's House Burns Down Twice: The Trivy Supply Chain Attacks Explained

We’ve been going back and forth on whether to publish this post. As the maintainers of Kubescape, a fellow CNCF open-source security project, we feel the weight of what happened to Trivy not as distant observers, but as people who see their successes and failures as our own. The Trivy maintainers are our friends. We share the same CNCF community, attend the same KubeCon-s, and fight the same fights (and share the same flights ).

Where Cato Sits in the AI Economy

Every major technological shift reshapes the landscape, creating both winners and losers. AI will be no different. The key question is which companies are positioned to capture the value it generates, and which ones may fall behind as it unfolds. If you look at previous technology shifts, the winners were not always the companies building the most visible products. They were often the ones that enabled the shift to happen in the first place, or those that benefited from the structural changes it created.

When Quantum Turns Encryption Into a Time Problem

If your encrypted traffic was captured today, would it still be private in ten years? That question changes the conversation. Leaders are used to asking, “Is it encrypted?” Now they are asking, “How long does it stay confidential?” That is where post quantum cryptography, or PQC, comes in. Its role is to strengthen the foundations of a secure connection by improving how trust is established before any data is exchanged. Today’s encryption still works.

8 Key DSPM Use Cases Every Enterprise Should Know

If your organization is evaluating DSPM solutions, you're likely already aware of the core promise: discover sensitive data, understand its risk, and improve your posture. But DSPM's value extends well beyond a single use case or a single team. Security leaders who get the most from their DSPM tool treat it as a cross-functional intelligence layer, not just a compliance checkbox. Below are eight use cases that illustrate how DSPM delivers value across both security and business outcomes.

Netacea's new Trust Layer launches for enterprises operating in the agentic economy

We have launched a new Trust Layer to help enterprises operate more safely and effectively as AI agents and other forms of automation shape the web as we know it. This exciting new era reflects a broader shift in how organisations need to think about digital traffic.

Delivering the Agentic SOC as a Service: A Turnkey Approach to AI-Driven Cybersecurity

Every year at RSA Conference, I spend time with security leaders who are trying to solve the same fundamental challenge. They know what strong security operations should look like, but the path to building and sustaining that capability inside their own organization has become increasingly difficult. The market is shifting from buying tools to buying outcomes.

The 'Urgency Trap': Why Time Pressure is Your Biggest Email Red Flag

The old rules for spotting a phishing email are changing. Remember looking for bad grammar and clumsy spelling? Thanks to AI, hackers' emails are increasingly polished and hard to spot. But a new poll from KnowBe4 reveals the modern worker's most reliable alarm bell for a cyberattack isn't a typo; it's a sense of manufactured urgency.

Common Mobile Data Security Mistakes Businesses Make

Businesses rely on mobile devices more than ever, yet many teams still underestimate how easily mobile data can slip into the wrong hands. A single unsecured mobile device can expose personal information, business emails, and even sensitive account numbers. Employees move between offices, homes, and public spaces throughout the day, which increases cybersecurity risks without anyone noticing. Strong habits and clear systems reduce exposure, but many organizations repeat the same mistakes that weaken data security and create preventable vulnerabilities.