Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Reach Security Joins the Microsoft for Startups Pegasus Program to Accelerate Agentic AI for E3/E5 Security Optimization

Reach Security announces its acceptance into the Microsoft for Startups Pegasus Program. Through the Pegasus Program, Reach will collaborate with Microsoft to help enterprise customers optimize their use of Microsoft E3 and E5 security suites by addressing configuration, visibility, and operational gaps through agentic AI.

WatchGuard Threat Lab's top six cybersecurity predictions for 2026

WatchGuard has revealed its top six cybersecurity predictions for 2026, forecasting a year where AI-driven threats, regulatory pressures, and the decline of legacy tools will reshape the security landscape. Corey Nachreiner, chief security officer at WatchGuard Technologies, emphasises that organisations must prepare for rapid evolution in both attack methods and defensive strategies.

Defining and Defending Against a Zero Day Attack

Unexpected attacks are the hardest to fend off. In the realm of cyber, Zero Day vulnerabilities are among the greatest risks, as these software flaws are unknown and exploited before a fix is available, potentially compromising the thousands of organizations that are unwittingly using vulnerable software.

Why Account Takeover Is a CX Problem, Not Just a Security One

Account takeover is usually and unsurprisingly approached as a security incident, yet much of the customer impact begins earlier in the journey, long before security teams detect or analyse the event. When users face friction, lockouts, or unexpected changes to their accounts, trust starts to erode. This makes the account takeover impact on customer experience a major determinant of brand trust and loyalty.

What is VoIP and How Does it Work?

Your phone rings. The number looks local, even familiar - so you answer. But within seconds, you're being asked to “verify your bank account” or “reset your login credentials.” Sounds suspicious? It is. That call likely came from a VoIP number, which is not a regular phone line. VoIP (Voice over Internet Protocol) lets anyone make calls over the internet, not just through mobile networks or landlines.

How Generative AI is Changing the DLP Landscape

Generative AI has revolutionized productivity, but it has also introduced a new class of data risk that legacy DLP tools simply can’t see. From engineers pasting source code into ChatGPT to marketers rewriting strategy docs, sensitive IP is leaving the browser through "Shadow AI" channels daily. Learn why traditional pattern matching fails against LLMs and how a data lineage approach secures AI usage without halting innovation.

Mend.io + Wiz: A New Code-to-Cloud Integration for Accurate, Context-Driven Risk Prioritization

Today, we’re excited to announce the availability of Mend.io’s new integration with Wiz, delivering a powerful Code-to-Cloud security workflow for joint customers. By bringing Mend SAST’s high-accuracy code findings directly into the Wiz platform, organizations can now unify code-level risks with cloud posture, runtime context, identities, and infrastructure—unlocking the complete picture needed to prioritize and remediate risk with confidence.

The 9 Best Endpoint Security Solutions

Endpoint security solutions are specialized software designed to protect endpoint devices like computers, mobile phones, and tablets from cyber threats. These solutions prevent, detect, and respond to attacks by managing the security of these devices across the network. But with so many different endpoint security solutions available in the market, how can you know which is the right fit for your endpoint security strategy?

The Australian startups guide to ISO 27001

Not sure whether your Aussie startup needs to obtain an ISO 27001 certification? ISO 27001 isn’t legally required, but if you plan on trading internationally or have potential customers who are international, many organisations won’t even open conversation with you if you don’t have an ISO 27001 certification. ‍ To put a long story short: if you collect, store, transmit, or process data in any way, you may want to consider it.