Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Gartner's 2025 Guide to Buying AppSec Tools & 5 Mistakes to Avoid

Choosing the wrong AST (Application Security Testing) platform doesn't just waste your budget. It leads to: In its latest research, “How to Avoid Common Pitfalls in Selecting Application Security Testing Tools,” Gartner highlights the five most common mistakes security leaders make when evaluating AST platforms. In this blog, we break down Gartner’s key insights and share what teams should look for when choosing a tool that works in the real world.

Elevating Your Experience: TMU 770 Release Brings Enhanced Reporting, Security, Control, and Performance

We’re excited to announce the release of TMU 770, packed with over 370 new features and enhancements across Windows Agent 25.28, Mac Agent 25.24, Web 25.30.1, Server 25.28, and BI 25.28. This release focuses on bolstering security, giving you greater control over your monitoring, and optimizing performance across the platform. Here’s a summary of what’s new and improved in TMU 770.

Introducing Apono's AI-Powered Access Assistant: Smarter Access Starts with a Conversation

Today we’re excited to announce the launch of Apono’s new AI-powered Access Assistant, now live across the Apono Cloud Access Management Platform. As AI continues to transform engineering and security workflows, this assistant brings natural language interaction to access management. Helping teams move faster while staying secure. By eliminating the guesswork from access requests, Apono’s Access Assistant gives engineers a powerful new way to get exactly the access they need.

Smarter docs, smarter security: How we're using AI to rethink PAM support

Let’s be honest — nobody wakes up excited to read documentation. You’ve been there. You’re configuring a tricky workflow, testing an API, troubleshooting a weird corner case. And instead of finding the answer fast, you’re 12 tabs deep, elbows in a PDF appendix, hoping for a miracle. That’s not how it should be.

Designing an Agentic AI Copilot: 8 Principles from Building Nyx

Everyone’s racing to build copilots right now. But making an agentic AI that feels like a trusted teammate—one that understands context, acts safely, and simplifies complex workflows—is harder than it looks. While building Nyx, our agentic AI copilot for security teams, our team spent a lot of time thinking about how to make her an effective team member - skilled and trustworthy.

You Can't Automate What You Don't Understand: Why Context Is the Missing Link in Exposure Management

In our recent webinar featuring Enterprise Strategy Group Principal Analyst, Tyler Shields, we discussed the widening gap between vulnerabilities organizations know about and what they can realistically fix. Most teams are swamped. Too much data, too many tools, and not enough people. Naturally, automation and AI come up as potential solutions. One comment from Tyler has stuck with me since watching and subsequently reviewing the webinar recording.

Mission Control for Modern Risk

Financial institutions face a harsh reality. As cyberattacks have become more sophisticated and move with greater velocity, a single incident can ripple across IT systems, payment networks, and customer accounts long before the organization can respond. The problem? Most security, fraud, IT operations, and risk teams still operate in silos. Each team monitors their own consoles, works from its own data, and follows its own playbooks.

Beyond PCI and HIPAA: How Feroot Powers General Data Protection Regulation (GDPR) Compliance

Yes. If your website is accessible in the EU and collects any user data—through forms, cookies, session recordings, pixels, or embedded scripts—then GDPR likely applies. But compliance isn’t as simple as publishing a privacy policy or showing a cookie banner. Modern web apps expose personal data through invisible front-end technologies like third-party JavaScript, ad tags, tag managers, and behavioral trackers.

From weeks to minutes: How Sumo Logic's historic baselining supercharges UEBA

Spotting threats fast and knowing whether they really matter is the name of the game in cybersecurity. That’s where user and entity behavior analytics (UEBA) comes in, and why Sumo Logic’s latest innovation, historic baselining, is a big deal. With this release, Sumo Logic has turned the old UEBA model on its head, delivering insights that used to take weeks of learning time in just minutes. Here’s how and why that’s a game changer.