Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Acronis Cyber Protect Local: Enabling OT resilience for manufacturers

One thing is certain for manufacturers: Cyberattacks on your operations will succeed. Improving detection and prevention capabilities is critical, but at some point, your operational technology (OT) environment will face a significant incident. What matters most is how quickly you can recover and resume operations.

How MSPs can solve their Microsoft 365 productivity crisis with AI and automation

Microsoft 365 is both powerful and challenging for managed service providers (MSPs). It's nearly ubiquitous at client sites, which means MSPs don't have to worry about managing multiple business suites. Unfortunately, protecting Microsoft 365 isn't easy. Microsoft's own level of protection is limited by design, and MSPs often have to cobble together a collection of unintegrated tools to keep Microsoft 365 data safe for clients. Technicians end up stretched thin as tickets pile up.

What is Exposure Management? From Visibility to Action

Exposure Management has quickly become one of the most talked-about concepts in cybersecurity. This article breaks down what exposure management really is, how it differs from vulnerability management, and why the ability to take action is what ultimately drives meaningful risk reduction.

Leveraging Cyber Threat Intelligence to Empower SOC Teams

Security Operations Centers (SOCs) are overwhelmed by alerts, often reacting to threats as they appear rather than anticipating them. Bitsight Threat Intelligence (TI) transforms SOC operations by providing external visibility, context, and correlation with real adversary behavior. By mapping incidents to MITRE ATT&CK techniques and monitoring the deep and dark web for emerging risks, Bitsight TI enables SOC and CTI teams to detect, understand, and prevent threats before they cause impact.

Will AI agents 'get real' in 2026?

In my house, we consume a lot of AI research. We also watch a lot—probably too much—TV. Late in 2025, those worlds collided when the AI giant Anthropic was featured on “60 Minutes.” My husband tried to scroll past it, but I snatched the controller away, unable to resist a headline calling out the first widely acknowledged case of an “agentic AI cyberattack.” The framing itself was irresistible, a milestone moment in the rapid acceleration of AI.

Looking Ahead at 2026 with Gartner: How Smarter Teams and Tools Are Making Application Security a Breeze

With my youthful good looks, it’s hard to believe that I’ve been in cybersecurity for almost two decades. : ) I’ve seen the industry go through some massive transformations. Each change brought its own set of challenges, failures (I’m looking at you XDR) and, more importantly, opportunities. As I am now entrenched in application security, I’m learning that we’re in the middle of another one of those moments, and it’s just as exciting.

Model Context Protocol Server: The Universal Remote for AI Agents

The Model Context Protocol (MCP) is emerging as a foundational interoperability layer for agentic AI, embraced by major platform providers. MCP simplifies how AI models connect to external tools and data. Think of it as a universal remote for security platforms: Instead of building fragile, one-off integrations, MCP allows AI to discover and use capabilities dynamically. For SIEM and detection providers, this shift is significant.

HIPAA Disaster Recovery Requirements: What Healthcare Organizations Really Need

What are HIPAA disaster recovery requirements? Healthcare data breaches exposed over 276 million patient records in 2024, representing more than 80% of the US population according to the HHS Office for Civil Rights. For healthcare organizations, the question is no longer whether a disruption will occur, but when. The HIPAA Security Rule addresses this reality directly through its contingency planning requirements, yet many organizations still operate with significant compliance gaps.