Beyond the Blind Spot: Achieving Data Mastery with Netskope at Currys

You can’t control what you can't see. Currys is fixing this, using data analytics and data stitching to correlate information across various endpoints to create a holistic view of its cloud environment. Netskope provides the core technology and DLP engine that powers Currys data protection strategy. Together, they built a mature data loss prevention (DLP) strategy, a model which is user-centric, allowing the business to drill into specific user behaviors rather than just focusing on applications.

When Defense becomes Dialogue: The Problem with LLM Security

For about thirty years, security has rested on the assumption that the measures guarding your systems do not have opinions. A firewall does not care how politely you ask it to open a port. An SQL filter does not weigh the context of a query before deciding whether to pass it through. An authentication check does not get distracted or talked round. You either present the right credential or you do not, and the answer is the same every time you ask.

The AI Inflection Point That Will Redefine Software Trust

Every few years, something enters the market that doesn’t just change the conversation — it restructures the underlying assumptions of an entire industry. The rapid advancement of AI systems purpose-built for software and security workflows is one of those moments. And I think most of the market is still misreading what it actually means. There will be no shortage of takes. Some will declare that AI has finally “solved” software security.

SecurityScorecard Weekly Brief: The Cyber Risk and Policy Edition - Amanda Smith

In this week’s Weekly Brief: The Cyber Risk and Policy Edition, SecurityScorecard’s Director, Public Sector Channel Amanda Smith unpacks the complexity of government procurement in the expansion of public sector vendors and how that impacts the technologies available to government entities. Historically, government partners have been slowed down by the nature of the government procurement process but changes implemented by the administration are changing this precedent.

The Mythos Effect and the End of "Business as Usual" for Security Operations and Risk Management

Something fundamentally shifted in cybersecurity. Claude Mythos, Anthropic’s frontier AI model, signaled the arrival of what the Cloud Security Alliance called an “AI vulnerability storm,” a world where vulnerabilities are discovered and exploited at machine speed. This is a compression event, collapsing timelines, expanding attack surfaces, and forcing a rewrite of how organizations think about security operations, software development, risk, and ultimately, business survival.

Falcon Data Security: Stop Data Loss, Not Productivity - End-User Justification & Forensics Capture

End the rigid, binary choice of traditional DLP. Falcon Data Security changes the game by using End-User Justification (EUJ) to educate employees at the point of risk, empowering them to make smart security decisions and keeping legitimate business transfers moving. For full context and compliance, Forensic Capture gives your security team the complete story with encrypted file retrieval and screen recordings of user activity before and after the event. Watch the demo to see how to maintain security without slowing down your team.

Shadow IT: Tiering the Unseen to Manage Vendor Risk

Another ping. And another. Employees are urgently logging IT tickets, trying to figure out why their trusted SaaS writing assistant subscription has expired. Meanwhile, your InfoSec team is frantically looking through the avalanche of alerts across the network, scouring vendor policies, and digging into procurement records to determine exactly when the organization provisioned this SaaS tool. Spoiler alert: The organization didn’t.