Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

It's time to rethink shadow AI.

It's time to rethink shadow AI. We've been told it's a fringe activity. A risk from rogue employees. Our new research proves that wrong. This is, ironically, no longer a "shadow" problem. It's a universal workflow hiding in plain sight. The question is no longer "how do we stop it?" It's "how do we manage it?" Our new report lands next week with the date you need to start answering that important question.

Introduction to Linea AI by Cyberhaven

Resolve incidents 5x faster, detect 40% more critical incidents, and reduce future incidents by 90% with Linea AI by Cyberhaven. Linea AI thinks like the smartest security analyst, precisely spotting insider risks across billions of workflows and every piece of data. It understands how people work the way a human would, but it never loses focus and can apply human-like insight at an incredible scale.

Fall 2025 Product Launch Teaser

Cyberhaven is excited to introduce Data Security Posture Management, now in Early Access. Existing DSPMs helped security teams inventory sensitive data across cloud repositories, but they stop short of delivering meaningful protection. They identify what data organizations have and where it resides, but not who owns it, where it came from, or how it’s being used. As data moves through modern organizations, copied between applications, repos, and endpoints, summarized into AI tools, and shared externally, those systems lose visibility and therefore their ability to protect data.

Non-Human Takeover: Cybersecurity Strategies from CyberArk & Xalient Experts

CyberArk & Xalient's top thought leaders provide insights & strategies for tackling the non-human takeover. The rise of non-human identities is reshaping cybersecurity. Join Mike Rohlfs and David (DJ) Morimanno as they share actionable strategies to protect your enterprise. Key Takeaways: Why non-human identities are the next big security challenge Proven strategies for identity threat detection and response Remediation techniques Making your business secure Free tools.

Securing The Win Episode Three: Nimesh Kotecha

From the track to the factory, every second counts. Thousands of devices. Streams of real-time data. No room for delays or doubt. In Episode 3 of Securing the Win, Oracle Red Bull Racing’s Nimesh Kotecha Group Head of End User Services at Oracle Red Bull Racing shows how 1Password helps deliver trusted access without friction, keeping their team fast, focused, and secure, even under pressure. Watch now.

November 03, 2025 Cyber Threat Intelligence Briefing

A critical remote code execution vulnerability in the Windows Server Update Services (WSUS) server role tracked as CVE 2025 59287 (CVSS: 9.8) addressed in the October patch cycle is under active exploitation. Researchers at RandoriSec produced a report on the current state of Microsoft Teams Access Token theft, a tactic that has been used by many threat actor groups to move laterally within environments and assist in internal phishing attacks.