Introducing our open source AI-native SAST

Static application security testing (SAST) tools help developers quickly catch potential vulnerabilities as they code. However, these tools rely on inflexible rules that often generate a high number of false positives, reducing trust in their accuracy and slowing adoption. To help developers access context-aware vulnerability detection, we’ve released an open source AI-native SAST solution. This tool scans code changes incrementally and surfaces security issues in real time.

Memcyco Certifications: ISO 27001, 27017, 27018 and SOC 2 Type II

As of 2026, Memcyco maintains active certifications across ISO/IEC 27001, ISO/IEC 27017, ISO/IEC 27018, and SOC 2 Type II (AICPA). These certifications confirm that Memcyco maintains independently audited processes for managing information security, securing cloud environments, and protecting sensitive data.

Auditing Agentic Behavior for FedRAMP Compliance | Teleport

AI agents are tireless, highly capable, eager to please, but difficult to manage. George Chamales (CriticalSec) and Josh Rector (Ace of Cloud) unpack the identity and access challenges posed by agentic AI. How do you verify it was the right agent, doing the right action, approved by the right person? How do we bound, constrain, govern agentic behavior? Ultimately, the same frameworks built for human identity and access should be applied to agents.

Rising Compliance Oversight Pressure: From Audit Fatigue to Continuous Readiness

Public sector cybersecurity leaders are no longer measured solely on whether they stop attacks, they are measured on whether they can prove it. Across federal, state, local and education environments, compliance obligations continue to expand. Frameworks and mandates include: These are not annual checkbox exercises. They require auditable, continuous evidence of control effectiveness, and for already stretched teams, this creates a second job: compliance documentation.

GDPR for Canadian Tech Startups: Do You Need to Comply?

You built something great. Your SaaS platform is signing up users. Your app is getting traction — some from Germany, some from France, maybe a handful from Sweden. You’re based in Toronto or Vancouver, operating under PIPEDA, and things feel legally tidy. Then a European enterprise prospect sends over a data protection questionnaire and asks: “Are you GDPR compliant?” Your stomach drops. You’re not sure.

Phishing Campaign Targets Japanese Firms During Tax Season

A criminal threat actor called “Silver Fox” is launching tax-themed phishing attacks against Japanese companies during the country’s tax season, according to researchers at ESET. “The ongoing campaign uses convincing phishing lures related to tax compliance violations, salary adjustments, job position changes, and employee stock ownership plans,” ESET says. “All emails share the same goal – trick the recipients into opening malicious links or attachments.

Preconstruction Modernisation: Reducing Risk Before Commitments Lock In

Preconstruction is no longer a buffer between design and delivery. Across UK construction projects, timelines are compressing, risk is shifting upstream, and teams are being asked to commit earlier with less certainty than ever before. At the same time, project information is increasingly fragmented across cloud platforms, project systems, shared drives, and email. Without structured information management, the speed gains from digital tools often amplify uncertainty rather than reduce it.