Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New Databricks and Snowflake apps strengthen cloud data security and data pipeline visibility

If you’re like most companies we work with, you’re awash in opportunities (and a bit overwhelmed with pressure) to adopt AI. Of course, integrating new technologies means more data to manage and systems to monitor.

Preventing Data Breaches Before They Happen: Why Outbound Email Security Can't Be Ignored

While organizations invest heavily in stopping threats from entering their networks, a critical vulnerability often goes underprotected: sensitive data leaving the organization through email. Every day, employees send thousands of emails containing confidential information - patient records, financial data, legal documents, and personally identifiable information (PII). And every day, some of those emails go to the wrong recipient.

AI-Assisted Social Engineering is a Growing Concern

A survey by the World Economic Forum (WEF) found that 47% of organizations cite the advancement of adversarial capabilities as their top concern surrounding generative AI. These capabilities include phishing, malware development, and deepfakes, all of which are increasingly accessible due to AI tools. Additionally, 42% of organizations experienced a successful social engineering attack last year, and the researchers expect this number to rise as AI-assisted social engineering grows more advanced.

The hidden cost of PKI: Why certificate failures aren't just an IT problem

For years, businesses have treated public key infrastructure (PKI) as background plumbing, quietly securing access across enterprise systems and devices, and rarely drawing executive attention unless something failed. New research from the Ponemon Institute suggests that those assumptions no longer hold.

Seeing What AI Touches: Introducing Data Lens

Security teams are entering a new phase of risk driven by the combination of AI agents and broad access to internal and external data. Agents are no longer limited to responding to prompts. They read files, pull documents from shared repositories, query external sources, and move information across systems on behalf of users. This shift brings real business value. Knowledge becomes easier to access, workflows move faster, and information that once required deliberate effort can be surfaced instantly.

Small Devices, Big Risk: USB Drives Threaten Enterprise Security

As cloud applications, SaaS platforms, and GenAI tools shape most modern workflows, one physical channel presents an ongoing risk: removable media. USB drives, external devices, and other portable storage remain some of the easiest ways for sensitive data to leave an organization and some of the quietest ways for threats to enter it.

The rise of fake job applicants: Why workforce security must start before day one

All over the world, companies are seeing a rise in fake job applicants. You may have experienced it yourself: dozens of near-identical resumes arriving within hours, or candidates who refuse to turn on their camera during video interviews. Remote hiring, global talent pools, AI-generated resumes, and increasingly sophisticated fraud networks have profoundly changed the hiring landscape. Traditional hiring processes were never built to defend against the types of candidate fraud we’re seeing today.

The most common concerns before renting a trade show booth - and how to address them effectively

Renting a trade show booth is an important decision for many brands. It allows companies to avoid the investment of building their own structure, yet requires confidence that the rented booth will support sales, branding and visitor engagement. In practice, organisations often share similar concerns related to flexibility, design consistency, logistical risks, cost predictability and the ability to customise the booth to their marketing goals. Modern modular solutions help eliminate these barriers already at the planning stage.

Why Browser Games Are a Safe Gaming Option

Browser games run entirely in-browser using HTML5, JavaScript, and WebGL technologies. These operate within contained environments enforced by browsers such as Chrome and Firefox, which naturally restrict access to local files or operating system functions, providing built-in security advantages.