Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Undercover Investigations: How AI is Supercharging Romance Scams

As someone that’s been in the industry for over 20 years, I’ve seen my fair share of online scams. But this is the kind of story you hear and can’t quite believe. At the last RSA cybersecurity conference, a colleague of mine–someone who lives and breathes digital security, a CISO–admitted he’d been taken in by an online romance scam. My first thought was, how?

Secrets Management: Definition, Challenges, and 7 Best Practices

A single leaked password can lead to devastating breaches. Thus, it’s important to understand that managing your organization’s secrets is not just an IT concern — it’s a business-critical security practice. From your customers’ data to the organization’s financial information, your secrets hold the keys to the most vital areas within your infrastructure. If they are not protected, neither is your sensitive data.

The Alarming Surge in Leaked Credentials: Protecting Your Business in 2025

One of the most pressing cyber threats businesses face today is the rampant rise in leaked credentials. Data from Cyberint, a Check Point company, reveals a staggering 160% increase in leaked credentials so far in 2025 compared to 2024. This isn’t just a statistic; it’s a direct threat to your organization’s security.

CyberArk earns Wiz partner award for advancing cloud identity innovation

Cloud complexity is growing. So are the risks—and the opportunities. As organizations scale their infrastructure across hybrid environments to innovate quickly, security strategies must evolve just as fast. The rapid adoption of multi-cloud environments and the proliferation of human and machine identities have intensified the challenge.

We Asked 100+ AI Models to Write Code. Here's How Many Failed Security Tests.

If you think AI-generated code is saving time and boosting productivity, you’re right. But here’s the problem: it’s also introducing security vulnerabilities… a lot of them. In our new 2025 GenAI Code Security Report, we tested over 100 large language models across Java, Python, C#, and JavaScript. The goal? To see if today’s most advanced AI systems can write secure code. Unfortunately, the state of AI-generated code security in 2025 is worse than you think.

Boosting Your Microsoft Email Security with Trustwave's Managed Phishing Service

It seems everyone loves phishing attacks. Trustwave's Ed Williams, Vice President of SpiderLabs, during a recent Trustwave webinar, discussed the ongoing threat posed by the increasingly sophisticated phishing incidents that remain the primary vector for initial access in cyberattacks. What Williams interestingly noted was that threat actors are not the only group using phishing to gain access to organizations.

Continuous DAST in CI/CD Pipelines: A Practical Guide

Every pipeline shift introduces a new blind spot. SAST catches coding flaws, and SCA catches dependency risks; however, as delivery moves to CI/CD, new risks have emerged, not in the code itself, but in how it is executed. From broken access controls and authentication drift to logic flaws behind feature flags, these threats show up in production. Continuous DAST in CI/CD pipelines isn’t just “another layer” but a runtime check that’s most likely to catch what gets exploited.

DAST Best Practices: A Guide for CXOs & Security Leaders

DAST often underdelivers, not because the tool is broken, but because it’s misapplied. It gets dropped into pipelines without strategy, runs against partial environments, skips authenticated areas, and generates findings that teams ignore. The result is predictable: wasted cycles and lost credibility. DAST best practices focus on addressing operational failures that render scans ineffective.

How Continuous DAST Empowers OWASP Top 10 Compliance

Your app isn’t just HTML anymore. It is containers talking to microservices, SPA front ends calling GraphQL, and third‑party SDKs everywhere. That mix creates blind spots and unpredictable OWASP Top 10 gaps. Continuous DAST looks through every layer, including mobile backends, APIs, and container workloads, simulating attacker behaviour across your entire technology stack. Hence, no more guessing which component hides the next SSRF, injection, or misconfiguration.

Unlocking Enhanced Security: What Egnyte's FedRAMP Moderate Equivalency Means for You

You may have read our recent blog about the EgnyteGov platform achieving FedRAMP Moderate Equivalency, and why it’s a significant milestone. In this latest blog, I’ll explain how Egnyte’s FedRAMP Moderate Equivalency benefits our current and prospective customers in managing their critical data.