Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Infrastructure Needs an Agentic Identity Framework - We're Building It

AI agents are about to cross a threshold. For infrastructure and security leaders, agentic AI is no longer an innovation topic but a production readiness problem. What started as sandboxed applications and tech demos at trade shows (bet you’ve seen a few of those) has morphed into long-running autonomous actors operating directly in production cloud and on-prem infrastructure. They read data, write code, deploy services, access databases, and make decisions continuously across environments.

Practical Tips for Tracking Vulnerability Remediation Progress

When vulnerability remediation succeeds at enterprise scale, it’s very rarely because the vulnerability management team is finding more vulnerabilities. It’s because the program was built around the idea of turning messy findings into steady, measurable risk reduction. That’s not an easy task. It’s easier to make it a numbers game, pointing to vulnerability volumes and how many findings were addressed, rather than accurately depicting how much real risk was eliminated.

EP 24 - FOMO, identity, and the realities of AI at scale

In this episode of Security Matters, host David Puner sits down with Ariel Pisetzky, chief information officer at CyberArk, for a candid look at the fast‑evolving intersection of AI, cybersecurity, and IT innovation. As organizations race to adopt AI, the fear of missing out is driving rapid decisions—often without enough consideration for identity, security, or long‑term impact.

Azure SQL Database Backup: A Complete Overview

Your Azure SQL database contains business-critical data that drives operations, analytics, and customer experiences. Losing this data, even temporarily, can impede revenue, damage customer relationships, and create compliance problems. Learning how to back up an Azure SQL database is essential for business continuity.

AWS KMS Vs Azure Key Vault Vs GCP KMS: Choose the Best Cloud Security Storage

Data breaches aren’t costing thousands anymore. They’re costing companies their reputation, their customers, and in many cases, their future. And here’s the part nobody tells you until it’s too late. It’s not always ransomware. It’s not always a missing patch. It’s not always some genius hacker breaking in through a zero-day exploit. It’s simply because someone gained access to the encryption keys.

Backup vs Disaster Recovery for Medical Practices: What's the Difference?

Many medical practice administrators believe their organization is protected because “we have backups.” When asked about disaster recovery, they point to the same backup system. This confusion between backup and disaster recovery creates significant risk, because backup alone cannot restore operations quickly enough when systems fail. The distinction matters because patient care depends on system availability.

Securing OT Access with Identity and Visibility: Kroll, Saviynt and Nozomi Networks

Industrial organizations face a new era of risk. As operational technology (OT) environments become more connected, the challenge of securing access and maintaining visibility continues to grow. In response, Kroll, Saviynt, Nozomi Networks and CrowdStrike have joined forces to deliver a unified solution that empowers organizations to protect their critical infrastructure without disrupting operations.

December Threat Intelligence Spotlight Report

Each month, our Cyber Threat Intelligence team compiles data from our engagements to determine key industry trends. We look at the initial access methods threat actors are using to gain entry into a network, types of incidents most commonly impacting organizations, which sectors are being more heavily targeted, and which threat groups are most prevalent.

Reach Security Recognized as a Representative Provider of ASCA in the Gartner Innovation Insight: Automated Security Control Assessment

In its January 2026 research report, Innovation Insight: Automated Security Control Assessment, Gartner discusses why misconfigured security controls remain one of the most persistent drivers of breaches and why automation is now required to address the problem at scale.