Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 Essential Steps to Strengthen Kubernetes Egress Security

Securing what comes into your Kubernetes cluster often gets top billing. But what leaves your cluster, outbound or egress traffic, can be just as risky. A single compromised pod can exfiltrate data, connect to malicious servers, or propagate threats across your network. Without proper egress controls, workloads can reach untrusted destinations, creating serious security and compliance risks.

Why Risk Assessments Fail Stakeholders: Bridging the Gap

You've been here before. The vendor risk assessment is complete, the report is generated, and it lands on a stakeholder's desk. And yet, this comprehensive, detailed document, which provides vital information on a vendor's security posture, goes nowhere. The handoff lands in limbo.

The Do's & Don'ts of Writing Audit-Proof Risk Assessments

When an auditor walks through your door, they aren't looking for a list of vulnerabilities; they're looking for proof that your Third-Party Cyber Risk Management (TPCRM) program is consistent, defensible, and robust. Internal and external auditors evaluate the Vendor Risk Management process by testing evidence, but they do so with different goals.

Keeping the Internet fast and secure: introducing Merkle Tree Certificates

The world is in a race to build its first quantum computer capable of solving practical problems not feasible on even the largest conventional supercomputers. While the quantum computing paradigm promises many benefits, it also threatens the security of the Internet by breaking much of the cryptography we have come to rely on. To mitigate this threat, Cloudflare is helping to migrate the Internet to Post-Quantum (PQ) cryptography.

Impending Chaos: One in Twenty Small Businesses Will Suffer Financial Loss

The most underserved cyber insurance market is the small and medium-sized businesses, emphasis on the small. There are roughly 33 million small business in the United States, and according to the insurance industry, there are only 4.3 million cyber insurance policies issued to small businesses… So what options do they have?

EP 18 - The humanity of AI agents: Managing trust in the age of agentic AI

In this episode of Security Matters, host David Puner sits down with Yuval Moss, CyberArk’s VP of Solutions for Global Strategic Partners, to explore the fast-evolving world of agentic AI and its impact on enterprise security. From rogue AI agents deleting production databases to the ethical blind spots of autonomous systems, the conversation dives deep into how identity and Zero Trust principles must evolve to keep pace.

Making AI Less "Wednesday:" A Practical Guide to Using AI in Cyber Defense

Artificial intelligence has only been available for a relatively short period. Still, already many cyber defenders are as frightened as if Jenna Ortega’s Wednesday Addams had whipped her head around and set her dark, dangerous eyes on them. It’s not hard to see why. Machine learning, Gen AI, and Retrieval-Augmented Generation (RAG) are a few of more than 20 new acronyms flooding our industry, with more being added almost every day.

The Top 10 Endpoint DLP Solutions of 2025 (and 30 FAQs Every Security Team Should Know)

Nightfall delivers the most comprehensive endpoint DLP in 2025 by combining lightweight agents with cloud-native architecture, protecting Windows, Mac, endpoints while uniquely preventing data leaks to AI tools with 95% accuracy.