Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Outpost24 Named an Overall Leader in 2025 KuppingerCole Leadership Compass Report for Attack Surface Management

Recognition Solidifies Outpost24’s Leadership in Attack Surface Management PHILADELPHIA (May 27, 2025) — Outpost24, a leading provider of cyber risk management and threat intelligence solutions, today announced it has been recognized as an Overall Leader in the 2025 KuppingerCole Leadership Compass Report for Attack Surface Management and is the only European vendor named as an Overall Leader in the report. The company was also named a leader in the Product and Market categories.

Welcome to Snyk Labs: Charting the Course for AI-Native Security

Software development is in the midst of a monumental shift, powered by the rapid advancements in Artificial Intelligence. AI isn't just changing how we build software; it's transforming the very nature of applications themselves. As AI-native applications become more prevalent, we're also seeing new, complex security threats emerge. Traditional security approaches aren’t designed for the dynamic and often unpredictable nature of Large Language Models (LLMs), agents, and other AI-driven systems.

How to Choose the Right Exposure Assessment Platform in 2025

Security teams know they need a better way to manage vulnerabilities. What they don’t always know is where to start. That’s where Exposure Assessment Platforms (EAPs) shine—some are even designed to cut through noise, eliminate manual workflows, and prioritize what truly matters. Effective EAPs consolidate findings from across your tools, triage them intelligently, and route them to the right teams for remediation. The promise is huge.

How crypto is changing the game for financial scammers

Crypto scams are evolving fast. Learn how scammers operate—and discover five simple ways to protect your money and identity in the crypto age. Cryptocurrency has transformed how we save, spend, and invest money. But with this wave of innovation comes a new breed of scams—slick, high-tech, and harder to spot than ever. Scammers have leveled up, using polished websites, fake influencer videos, and deep knowledge of human behavior to pull off million-dollar schemes.

Tines' Field CISO Matt Muller on security's communications problem and the future of the SOC

In this week’s episode of The Future of Security Operations podcast, I'm joined by Matt Muller, Field CISO here at Tines. With over a decade of experience at companies like Material Security, Coinbase, and Inflection, Matt’s got a strong track record of scaling SecOps teams, building threat detection and mitigation programs, and driving trust and safety initiatives. His knowledge impressed the Tines team so much that we invited him to join the team as our first Field CISO. Matt and I discuss.

Proposed HIPAA Update Makes Yearly Pen Testing Mandatory

In January of this year, significant changes to the HIPAA Security Rule were proposed by the Office of Civil Rights for the Department of Health and Human Services (OCR). The proposed update to the HIPAA Security Rule, published on January 6, 2025, introduces a significant new requirement: all covered entities and business associates must conduct penetration testing of their electronic information systems at least once every 12 months.

The Importance of Triage in Incident Response

Gamers of a certain age likely remember the video game Asteroids. You played as a little triangular spacecraft shooting at big space rocks that started traveling towards you slowly at first, then gained speed. As you revolved around trying to protect yourself by shooting them, you inevitably had to make some rapid decisions about which asteroids would harm your ship the most and which ones you could potentially ignore.

Web API Authentication and Authorization Step By Step

In an era where APIs are the connective tissue of enterprise ecosystems, authentication and authorization can no longer be treated as mere checklist items. They must become strategic disciplines—crafted thoughtfully to align security with business velocity, regulatory expectations, and evolving threat landscapes.

A Guide to Fintech Security

Fintech security refers to the protocols, technical controls, and tailored policies that protect financial technology systems, software, and customer data from cyber threats. It ensures confidentiality, integrity, and availability across digital financial services through systems designed to prevent fraud, protect transactions, and detect security events before they cause irreversible harm.