Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Investor Serhiy Tokarev announces a new intake for the Generation H programme

This year, the Generation H accelerator programme, launched by SET University in partnership with the Tokarev Foundation, has gone global. In addition to teams from Ukraine, startups and founders from other countries can now participate.

CyberPhysical Security: Protecting the Modern EV Charging Perimeter

Electric vehicles have crossed from niche technology into mainstream infrastructure. Charging networks now form a critical layer of both the energy grid and the transportation system, and attackers have noticed. EV charging sits at a three-way intersection of cloud software, operational technology, and automotive systems. Each domain has its own threat model, its own tooling, and its own team assuming someone else owns the risk. That gap is where adversaries operate.

How to Protect Your Enterprise from High-Stakes Business Litigation

High-stakes litigation can drain a company's resources and focus. Protecting an enterprise requires a proactive approach to risk. Leaders must look ahead to spot potential legal traps before they cause damage. Safeguarding a brand is about building a wall against future threats. It allows for steady growth without constant fear of lawsuits. Small steps taken today prevent massive headaches tomorrow.

Best B2B Cross-Border Payment Solutions: Security, Compliance and Global Reach

Every international business payment creates a security surface. Data moves across borders. Sanctions screening must fire in real time. FX execution carries counterparty risk. Correspondent banking chains introduce opacity at every hop. The platforms businesses choose to move money internationally are, in a meaningful sense, a security decision as much as a financial one.

GitProtect Report: DevOps Incidents Rise by 21%, While Impact Hours Double to 9,255

With 607 recorded incidents, DevOps platforms experienced a 21% year-over-year increase, while total disruption time nearly doubled to 9,255 hours in 2025. This marks a clear rise in both the frequency and severity of outages compared to the previous year, according to the latest GitProtect Report.

Cato CTRL Threat Research: New Vulnerabilities in NVIDIA NeMo and Meta PyTorch Enable Full System Compromise

Cato CTRL has discovered high-severity vulnerabilities in NVIDIA NeMo (CVE-2025-33236 with a CVSS score of 7.8) and Meta PyTorch that turns AI model files into remote code execution (RCE) vectors. The NeMo vulnerability allows RCE by importing a malicious AI model. The NeMo framework silently executes threat actor-controlled code with no warning.

AI SOC Metrics That Actually Matter: How to Measure Whether AI Is Working in Your SOC

Every security vendor shipping an AI product in 2026 makes the same promises. Faster triage. Shorter response times. Fewer false positives. Reclaimed analyst hours. But, six months after deployment, most security leaders still cannot answer a straightforward question from the board: Is this thing actually working?

You Can't Secure AI Agents You Haven't Found

Most organizations have a reasonable handle on their sanctioned SaaS apps. Model Context Protocol - hit 10,000 public servers within a year of launch, with 97 million monthly SDK downloads. None of those numbers capture the servers your developers configured locally. Those don't appear in any registry. They were added at the IDE level, one developer at a time, with no approval step and nothing that touches a central system. That's the inventory problem. It comes before any question of enforcement.

Types of AI agents: From simple reflex to autonomous systems

AI agents fall into five foundational categories: simple reflex, model-based reflex, goal-based, utility-based, and learning agents. Each is defined by how much environmental awareness and decision-making complexity the system can handle, from fixed condition-action rules to feedback-driven self-improvement.