Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Dry Run: Your Kubernetes network policies with Calico staged network policies

Kubernetes Network Policies (KNP) are powerful resources that help secure and isolate workloads in a cluster. By defining what traffic is allowed to and from specific pods, KNPs provide the foundation for zero-trust networking and least-privilege access in cloud-native environments. But there’s a problem: KNPs are risky, and applying them without a clear game plan can be potentially disruptive.

How to Optimize DevSecOps Workflows Using JFrog

Embedding security within the Software Development Life Cycle (SDLC) is no longer just a best practice; it’s a full-on necessity. DevSecOps extends the DevOps model by making security a shared responsibility from the earliest stages of development. Today’s enterprises require this kind of integrated approach to streamline workflows from development to deployment.

Pegasus Spyware Email Scam: How to Detect and Protect Yourself

Among today's rising cyber threats, Pegasus spyware email has become one of the most famous names among the latest threats. Pegasus is a malware spy tool developed for extensive surveillance but has now been turned into the new wave of scams exerted by cybercriminals, especially through Pegasus spyware scam mails used to extort money from victims, claiming their devices had been hacked.

CompassDRP Social Media integration: Six real-world use cases

Social media can work both for and against an organization, so it’s worth treating these sites as extensions of your attack surface. CompassDRP’s Social Media integration continuously monitors both corporate and employee profiles across platforms such as Twitter, LinkedIn, and Facebook. It automatically flags unauthorized or impersonating accounts that mimic executive identities or misuse company branding, helping to thwart phishing and fraud campaigns before they gain traction.

Introducing Full Workload Inventory Visibility in ARMO: See What's Running, What It's Doing, and How It's Protected

At ARMO, our mission is to make Kubernetes security more accessible, actionable, and effective. That’s why we’re excited to launch a major upgrade to our platform: Full Workload Inventory Visibility. This powerful new capability helps security and platform teams answer the question at the core of Kubernetes security.

EP 11 - The calm CISO: Strength under pressure

What does it take to stay calm in the face of constant cyber pressure—and why does that mindset matter more than ever? In this episode of Security Matters, host David Puner speaks with Den Jones, founder and CEO of 909Cyber, about his transition from enterprise chief security officer (CSO) to cybersecurity consultant.

Addressing Recent Vulnerabilities and Our Commitment to Security

At CyberArk, the trust and security of our customers are at the heart of everything we do. Today, July 15th, we are addressing the publication of several Common Vulnerabilities and Exposures (CVEs) related to CyberArk Secrets Manager, Self-Hosted (formerly Conjur Enterprise) and Conjur Open Source (OSS). We regret the challenges this situation may pose to our customers and reaffirm our commitment to supporting them through the resolution process.

Understanding the Core Benefits of Stablecoins for Payments and Remittance Companies

When I joined Fireblocks ten months ago, stablecoins were just starting to break into the payments conversation. Today, that conversation is everywhere. At Stablecon 2025 and in one-on-one conversations with PSPs, global marketplaces, and fintech leaders, I’ve seen the shift firsthand: stablecoins have crossed the chasm. In 2024 alone, Fireblocks infrastructure facilitated over $1.5 trillion in stablecoin transaction volume.

Hyper-volumetric DDoS attacks skyrocket: Cloudflare's 2025 Q2 DDoS threat report

Welcome to the 22nd edition of the Cloudflare DDoS Threat Report. Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of Distributed Denial of Service (DDoS) attacks based on data from the Cloudflare network. In this edition, we focus on the second quarter of 2025. June was the busiest month for DDoS attacks in 2025 Q2, accounting for nearly 38% of all observed activity.