Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top 10 Identity and Access Management (IAM) Vendors of 2026

We log into tons of apps each day, running on digital identities. With just one click, you can access thousands of apps without breaking a sweat. However, digital identities bring with them cyber threats, which are growing sharper each day, and compliance is getting tighter. So, who is the right person to trust to safeguard your digital identities? As organizations, you collect, store, analyze, and process sensitive data, which needs to be safeguarded with the right tech and tools.

Glassworm Strikes Popular React Native Phone Number Packages

On March 16, 2026, two React Native npm packages from the AstrOOnauta were backdoored in a coordinated supply chain attack. Both releases added an identical install-time loader that fetches and executes a multi-stage Windows credential and crypto stealer, triggered by nothing more than a routine npm install. The affected packages are react-native-country-select@0.3.91 and react-native-international-phone-number@0.11.8.

See through document fraud with Document AI Enhanced Fraud Detection

On April 2, 1796, a full house packed the Drury Lane Theatre in London, eager to witness the first showing of a newly discovered Shakespeare play. The problem was that William Henry Ireland wrote the play, Vortigern, and the entire production was a hoax. Although there was some controversy before opening day, several experts reviewed the manuscript and supporting documents and confirmed that the play was a long-lost Shakespeare original.

The 10 Types of Insider Threats Every Security Team Needs to Know

Insider threats account for 34% of all data breaches, yet most organizations are still building security programs designed to stop attackers from the outside. The harder truth? The risk is already inside your walls, and it doesn't always look like a criminal. Not every insider threat is malicious. Some are distracted. Some are overworked. Some are just trying to get things done faster.

Code Review That Learns: Inside Cato R&D's Self-Evolving PR Review Agent

Agentic AI promises to improve work processes in all domains and industries. R&D is no different. Recently, Cato R&D built an internal self-evolving pull request (PR) review agent that keeps reviewers in flow by commenting only on high-impact, high-confidence issues, validating every change against its spec from the PR and Jira, and learning continuously from developer feedback through long-term, episodic memory. What were the results?

What security leaders need to know about zero trust identity management in 2026

The evolution of cybersecurity challenges and the rapid pace of digital transformation have led security leaders to focus increasingly on robust and adaptive security frameworks. Among them, zero-trust identity management has emerged as a cornerstone of modern security strategies.

Rory Innes Calls for Better Cybercrime Support in London

On 11th March, our CEO, Rory Innes, stood before the London Assembly’s Police and Crime Committee to represent a group of people who are too often overlooked: victims of digital fraud, cybercrime and online harm. In a session focused on how the Metropolitan Police Service’s Cyber Crime Unit is protecting Londoners from digital fraud, Rory made a direct and powerful case for why the current system is failing the public.

How to Evaluate AI Workload Security Tools for Enterprise Teams

You’ve sat through three vendor demos this week. Vendor A showed you an AI-SPM dashboard with a pie chart of misconfigurations. Vendor B showed you a nearly identical dashboard with different branding and a slightly wider set of compliance frameworks. Vendor C showed you posture findings with an “AI workload” tag that wasn’t in their product last quarter.

AI Workload Security on AWS: Evaluating Native Tools vs Third-Party Solutions

Your Bedrock agent running on EKS receives a prompt through your RAG pipeline. CloudTrail logs it as a normal bedrock:InvokeModel event—status 200, authorized IAM role, expected endpoint. But inside the container, the agent’s response triggers a tool call that spawns curl to an external IP, exfiltrating the context window. GuardDuty doesn’t flag it because the connection routes through a permitted VPC endpoint. You open your AWS console and see a healthy API call.