Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Beyond Plain Text: Egnyte's Journey to Structured Data Extraction in RAG Systems

When we first launched Egnyte’s AI features built on retrieval-augmented generation (RAG), customer response was overwhelmingly positive. Users could quickly find and synthesize information from vast document repositories with accuracy and context. But success breeds ambition. As customers grew comfortable with the system, they began exploring new use cases that revealed a limitation: while our RAG excelled with plain text, it struggled with tables, charts, and other structured formats.

Build, test, and scale detections as code with Datadog Cloud SIEM

Security teams often struggle to keep up with rapidly evolving threats, especially when they have to manually manage detection rules. Without automation or version control, it's difficult to maintain consistency across environments, track changes, or deploy updates quickly. Datadog Cloud SIEM supports detection as code, a structured approach to authoring, testing, deploying, and managing detection rules using code and infrastructure-as-code tools like Terraform.

vCISO or Fractional CISO: Which Is Right for Your Business?

A virtual Chief Information Security Officer (vCISO) is a senior cybersecurity leader who works remotely with your business, typically on a part-time, retainer, or per project basis. They bring with them the expertise of a full-time CISO minus the expense of hiring one in-house. vCISOs tend to be brought in to help shape security, strategy, manage risk, and guide businesses through compliance frameworks such as GDPR, ISO 27001, or Cyber Essentials.

Why AWS-native companies choose Vanta for compliance

Building products while pursuing compliance frameworks like SOC 2 or HIPAA can feel complex and time-consuming. Challenges such as unclear integrations, manual evidence collection, and procurement delays are common, but with AWS-native automation tools, companies can overcome these hurdles and accelerate their compliance journey. ‍ In this post, we'll break down three core ways Vanta simplifies compliance for cloud-forward teams, so you can move faster, stay secure, and focus on building. ‍

Innovations in Splunk Security Expands Unified TDIR Experience to On-Premises and FedRamp Moderate Environments

At RSAC 2025 Conference we announced new innovations to Splunk Security. Today, we are pleased to announce the general availability of Splunk Enterprise Security 8.1. Splunk becomes the only vendor to bring truly unified threat detection, investigation, and response (TDIR) workflows fueled by automation to both customer managed deployments and FedRAMP Moderate environments.

OpenAI Report Describes AI-Assisted Social Engineering Attacks

OpenAI has published a report looking at AI-enabled malicious activity, noting that threat actors are increasingly using AI tools to assist in social engineering attacks and influence operations. In one case, the company banned ChatGPT accounts that were likely being used in North Korean attempts to fraudulently obtain jobs at US companies. “Similar to the threat actors we disrupted and wrote about in February, the latest campaigns attempted to use AI at each step of the employment process.

Keeper Security Named Overall Leader in 2025 GigaOm Radar Report for Enterprise Password Management

GigaOm, a renowned technology analyst firm, has recognized Keeper Security as the Overall Leader in Enterprise Password Management for the fourth year in a row. The GigaOm 2025 Radar Report for Enterprise Password Management highlights Keeper’s Privileged Access Management (PAM) solution, KeeperPAM, which helps organizations secure passwords, credentials, secrets and connections to mitigate cyber risks and defend against internal and external threats.

What To Know About the UNFI Cyber Attack

On June 9, 2025, United Natural Foods, Inc. (UNFI) – a major organic food distributor and the main grocery supplier for Whole Foods Market – reported a cyber attack. UNFI first discovered unauthorized activity in its IT systems on June 5 and immediately took some systems offline. At the time of this writing, the investigation is ongoing as officials assess the full impact of the breach.

Elevating Cyber GRC With a Smarter Risk Register Strategy

‍Cybersecurity governance, risk, and compliance (GRC) programs are gaining institutional support, with 61% of respondents from Sprinto's "Pulse of Cyber GRC Report 2025" claiming that embedding GRC into their business strategy is one of their organization's top priorities. Even so, only 53% state that they are doing so effectively, highlighting the prevalent gap that exists in the cybersecurity world between intention and execution.