Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

6 Ways to move from security questionnaires to self-serve trust

In this session of the Strategic CISOs webinar series, Sravish Sridhar (CEO, TrustCloud) sat down with Myke Lyons (CISO, Cribl) and Jon Zayicek (Customer Security Assurance Leader, Cribl) to break down how Cribl built a customer trust program that helps buyers self-serve proof, reduces questionnaire drag, and gives security a clear line of sight to pipeline and ARR. Cribl has turned customer assurance into a revenue accelerant, and that posture has produced great results.

Two is one, one is none: the art of resilient operations

On a cold and windy day in March 1996, a group of 25 Marine Corps second lieutenants, accompanied by their instructors, participated in a communications field exercise at Fort A.P. Hill, Virginia. The objective was to provide training on installing, operating, and maintaining a tactical communications architecture while continuously relocating. The terrain at Fort A.P.

When Agentic AI Becomes an Attack Surface: What the Ask Gordon Incident Reveals

Pillar Security’s recent analysis of Docker’s Agentic AI assistant, Ask Gordon, offers an early glimpse into the security challenges organizations will face as AI systems begin operating inside the development stack. Their researchers discovered that a single poisoned line of Docker Hub metadata caused the agent to run privileged tool calls and quietly exfiltrate internal data.

How to Spot and Avoid Scams: A Holiday Survival Guide

Can you believe it? The holiday season is finally here! For many of us, that means nostalgic traditions, quality time with family, and—let’s be honest—a significant amount of online shopping. The convenience of browsing for gifts from the comfort of our homes is undeniable, especially in our hybrid work environment. However, this surge in digital activity and scams also signals the busiest time of year for cybercriminals.

Unlocking AI's Potential: Network Trends and Challenges

Artificial intelligence is no longer just an overused buzzword; it’s a fundamental shift in how businesses operate. The Architects of AI were just named as Time’s person of the year for 2025. From generative AI creating code to machine learning algorithms optimizing supply chains, the demand for AI is reshaping the technology landscape. But here’s the thing: all that computational power is useless if your data can’t move fast enough.

Social Engineering Tactics 2026: How Attackers Are shifting from Email to 'Swipe-Up' Scams

The image of the cyber attacker is changing. For years, the industry focused on email gateways and typo-squatted domains like citi-bank-security.com. But according to Tzoor Cohen, CTI Lead at Memcyco, the battleground has shifted. In 2026, the most dangerous social engineering tactics typically don’t start in an inbox. They start on social media, utilize legitimate infrastructure like Bitly, and exploit the user interface (UI) of mobile devices to hide malicious intent.

Apache Commons Text Code Injection Vulnerability (CVE-2025-46295)

A critical code injection vulnerability has been identified in Apache Commons Text, a widely used Java library for text processing and interpolation. Tracked as CVE-2025-46295, the vulnerability carries a CVSS v3 score of 9.8 (Critical) and affects all versions of the library prior to 1.10.0. The vulnerability has an EPSS score of 0.253%, indicating a low short-term probability of exploitation.

Vibe check your vibe code: Adding human judgment to AI-driven development

Remember when open meant visible? When a bug in open-source code left breadcrumbs you could audit? When you could trace commits, contributors, timestamps, even heated 2:13 a.m. debates on tabs versus spaces? That kind of openness created confidence in the code and made it possible to hold contributors accountable when issues arose. Today, as AI changes how code is created and shared, those familiar markers of trust and transparency are becoming harder to find.

New Configuration Change History in Forward Enterprise

Modern networks change constantly as teams modify interfaces, adjust routing, enable features, or deploy security controls. Over time, these individual updates create a complex configuration history that is rarely documented comprehensively. Without access to historical configuration data, engineers face significant challenges determining when changes occurred, whether they align with approved change windows, or how they influenced network behavior.