Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Inside the tech that continuously monitors our customers' attack surface

As part of our Detectify under the hood blog series, we recently introduced our new engine framework and how it helped us address a critical 0-day vulnerability within a day. In this article, we deep-dive into the problem space of monitoring our customers’ attack surface and distributing security tests to them.

Cut Through the Hype: Tips for Evaluating AI Solutions for an Autonomous SOC

As C-suites and boards are bombarded with headlines about AI revolutionizing cybersecurity, it’s no wonder they’re putting pressure on SOC leaders to adopt AI. The promise of AI in the SOC is rightfully alluring. An AI-native autonomous SOC has the potential to create a world where AI Agents collaborate with each other to take care of repetitive tasks and handle the majority of low-level alerts, freeing your human team up for strategic, proactive work. The hurdle?

SafeBreach 2024 Year in Review: Reflections from Co-Founder & CEO Guy Bejerano

Happy new year! 2025 is underway and the SafeBreach team is off to a strong start after a record-breaking 2024. We are keenly focused on the vision, goals, and opportunities that lie ahead in the new year—some of which we are excited to share in much more detail soon. But, before we close the books on 2024, I wanted to take a moment to reflect on all that we accomplished over the last year with the support and partnership of the SafeBreach community.

JFrog Cloud Native Innovation - Availability, Security Performance and Efficiency at Scale

JFrog uses open source tools such as Kubernetes, Kubernetes Event-driven Autoscaling (KEDA), and Prometheus to develop its cloud development infrastructure and ensure tight integration with the three leading cloud providers AWS, GCP, and Azure. Let’s explore how JFrog cloud deployments leverage our cloud-native architecture to provide enhanced security and management capabilities for DevOps while ensuring high availability and a transparent user experience for developers.

How to Secure AI and Protect Patient Data Leaks

AI systems bring transformative capabilities to industries like healthcare but introduce unique challenges in protecting patient data. Unlike traditional applications, AI systems rely on conversational interfaces and large datasets to train, test, and optimize performance, often including sensitive patient information. AI systems pose complex risks to patient data privacy and AI data security that cannot be effectively managed using traditional methods.

Tips and Considerations for Building a New Home

Embarking on the adventure of building a new home can be both exhilarating and daunting. It is an opportunity to create a space that perfectly aligns with your preferences, needs, and lifestyle. However, before the first shovel hits the ground, significant planning is needed to ensure your home-building experience is as smooth as possible. The key lies in thoughtful preparation and understanding the main pillars of home construction. Below, we highlight essential insights to guide you through building your dream home from conception to completion.

How Computer Forensic Services Enhance the Accuracy of Legal Investigations

We all know that everything is online nowadays. From texts and emails to documents and images - it is all digital. So, when something goes wrong, like a crime or a dispute - you can bet that a lot of the evidence will be digital, too. That is where computer forensic services come in. These services dig through computers, phones - and other devices to find hidden evidence that might not be obvious at first glance. But how exactly do they help with legal investigations? Let's take a look.