Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Monitor MCP Usage: A 10-Step Security Checklist for 2026

What you need to know: MCP can evade traditional DLP, IAM, and SIEM controls because agent traffic looks like authorized API calls, sensitive data is semantically transformed before it leaves the perimeter, and exfiltration happens through tool invocations rather than file transfers.

CVE-2026-23918: Apache HTTP/2 Double-Free Vulnerability with Possible RCE

A high-severity double-free vulnerability in Apache HTTP Server 2.4.66 allows low-privileged attackers to remotely crash vulnerable servers through a crafted HTTP/2 request sequence, with a demonstrated path to remote code execution on common Linux deployments. Tracked as CVE-2026-23918, the vulnerability exists in Apache’s mod_http2 module and affects deployments using multi-threaded MPMs such as worker and event.

Sophos named a Leader in the KuppingerCole Analysts Leadership Compass for Managed Detection and Response 2026

Sophos named a Leader in the KuppingerCole Analysts Leadership Compass for Managed Detection and Response 2026 Sophos recognized across four leadership categories: Overall, Product, Innovation, and Market Sophos has been named an Overall Leader in the 2026 KuppingerCole Analysts Leadership Compass for Managed Detection and Response (MDR).

Multi-agent security operations: LimaCharlie's architecture, built for auditability

Most multi-agent security deployments fail in production not because the agents can't act, but because there's no shared context layer between them. When something goes wrong, the audit trail doesn't exist. In LimaCharlie, solving that problem is architectural, and the solution starts with how individual agents are defined.

Shadow IT: Tiering the Unseen to Manage Vendor Risk

Another ping. And another. Employees are urgently logging IT tickets, trying to figure out why their trusted SaaS writing assistant subscription has expired. Meanwhile, your InfoSec team is frantically looking through the avalanche of alerts across the network, scouring vendor policies, and digging into procurement records to determine exactly when the organization provisioned this SaaS tool. Spoiler alert: The organization didn’t.

The Mythos Effect and the End of "Business as Usual" for Security Operations and Risk Management

Something fundamentally shifted in cybersecurity. Claude Mythos, Anthropic’s frontier AI model, signaled the arrival of what the Cloud Security Alliance called an “AI vulnerability storm,” a world where vulnerabilities are discovered and exploited at machine speed. This is a compression event, collapsing timelines, expanding attack surfaces, and forcing a rewrite of how organizations think about security operations, software development, risk, and ultimately, business survival.

The AI Inflection Point That Will Redefine Software Trust

Every few years, something enters the market that doesn’t just change the conversation — it restructures the underlying assumptions of an entire industry. The rapid advancement of AI systems purpose-built for software and security workflows is one of those moments. And I think most of the market is still misreading what it actually means. There will be no shortage of takes. Some will declare that AI has finally “solved” software security.