Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

4 ways to scale compliance with AI

You got compliant—congrats! That’s a big milestone. It tells customers, investors, and the world that you take security seriously. But compliance doesn’t stop at your first audit. As your company grows, so do the requirements. You’ll have to manage new frameworks, more policies, faster timelines, more scrutiny, and more complexity. ‍ Modern GRC teams need to do more with less.

Maximizing Your Security Investment with the Microsoft Azure Consumption Commitment (MACC)

If your organization has a Microsoft Azure Consumption Commitment (MACC), you’re already on the path to optimizing cloud spend. But are you making the most of it? MACC isn’t just a budgeting tool, it’s a strategic advantage. By transacting eligible solutions through the Azure Marketplace, you can decrement your commitment while accelerating your cloud security and operations. That’s where BlueVoyant comes in.

Salesloft Drift incident overview and CyberArk's response

It was recently reported that Salesloft’s Drift application was breached, allowing unauthorized access to its customers’ Salesforce data and affecting hundreds of organizations, including CyberArk. Upon learning of this incident, we quickly deployed threat containment measures, including terminating our Salesforce–Drift connection; disabling the Drift application and revoking all related user credentials; and rotating all Salesforce integration credentials.

Why Detection? Why Now? Key Takeaways from the NIST NCCoE Public COI Working Session

In April, I had the amazing opportunity to participate in a unique AI security event put on by the National Cybersecurity Center of Excellence (NCCoE). The April event was all about getting the community together to discuss what a Cyber AI Profile should look like as an overlay to the NIST Cybersecurity Framework (CSF) 2.0.

The xAI Wake-Up Call: A CISO's Guide to Preventing Data Exfiltration

The recent lawsuit filed by xAI against former engineer Xuechen Li should serve as a critical wake-up call for every CISO. When a trusted engineer can allegedly download proprietary Grok IP, and jump to a competitor, it exposes fundamental gaps in how we protect our most valuable digital assets. This isn't just about one rogue employee. It's about the reality that your company's most sensitive data is at the risk of exfiltration every day—in laptops, SaaS and AI apps, endpoints and browsers.

EMBER2024: Advancing the Training of Cybersecurity ML Models Against Evasive Malware

CrowdStrike data scientists are members of a team of cybersecurity researchers that recently released EMBER2024, an update to EMBER, the popular open source malware benchmark dataset originally released in 2018. The EMBER2024 dataset includes metadata, labels, and calculated features for over 3.2 million files from six different file formats.

Examples of AI Privacy Issues in the Real World

What’s the fastest way to lose trust? Expose private data. With AI moving from pilots to core workflows in support, finance, HR, and healthcare, one careless prompt or leaky integration can turn into headlines, fines, and weeks of incident response. The most useful way to understand the risks is to study AI privacy issues examples from the real world.

No More Blind Spots: Detecting WAF / CDN Control Bypass in IONIX Exposure Management

In today’s digital landscape, web application security is more critical than ever. Most organizations rely on Cloud-Based Security Providers offering integrated Web Application Firewalls (WAFs) and Content Delivery Networks (CDNs), for shielding their assets from direct exposure and attacks such as SQL injection, XSS, and DDoS.

Outpost24 Recognized as a Major Player in IDC MarketScape for Exposure Management

PHILADELPHIA (Aug 25, 2025) – Outpost24, a leading provider of exposure management solutions, today announced it has been named as a Major Player in the IDC MarketScape: Worldwide Exposure Management 2025 Vendor Assessment. The Outpost24 team believes this recognition underscores our comprehensive exposure management solutions and commitment to delivering exceptional customer service.