What Is a PCI ASV Scan? A Guide to PCI DSS Compliance Scanning

“We do not store any credit card data, we outsource it. PCI DSS is not relevant for us.” If you think this way, you are not alone, but it is a misconception. The Payment Card Industry Data Security Standard (PCI DSS), is designed to enhance the security of credit card data. It applies to all organizations that store, process, or transmit cardholder data and sensitive authentication data, or that could affect the security of the environment used for such data.

How AI is changing IGA

It’s no surprise that AI is being integrated into identity governance and administration (IGA) platforms. Automation promises productivity boosts, risk detection can be in real-time and cloud environments allow greater scalability. What’s more, the pace of AI means IGA is quickly moving beyond slower, more rigid, rule-based approaches.

George Kurtz + Dan Ives on AI Agents Bypassing Security Policies

One AI agent didn’t have permission to fix an issue… so it asked another agent with access to do it. Another? It rewrote the security policy to achieve its goal. This isn’t theory. This is happening. George_Kurtz sat down with DivesTech to discuss why AI needs guardrails.

Acronis earns SoftwareReviews recognition for midmarket endpoint protection

Acronis has earned new recognition from Info‑Tech SoftwareReviews, with Acronis Cyber Platform named a leader in the Endpoint Protection – Midmarket Data Quadrant. This recognition is based entirely on feedback from verified end users, highlighting the value MSPs and their clients see in Acronis endpoint protection capabilities. Unlike awards driven solely by analyst opinion or market presence, SoftwareReviews’ recognition reflects real‑world experience.

Exploring Active Roles RBAC solution for streamlined permissions management

Despite constant sweeping changes across IT, Active Directory (AD) continues to be the center of identity and access management (IAM) processes for most enterprises. Even as organizations adopt cloud identity platforms, on-premises AD carries the lion’s share of user authentication, authorizing access to critical systems and anchoring hybrid identity strategies. Because of this central role, AD security is nearly inseparable from directory security, cyber-resilience and breach prevention.

The AI Supply Chain is Actually an API Supply Chain: Lessons from the LiteLLM Breach

The recent supply chain attack involving Mercor and the LiteLLM vulnerability serves as a massive wake-up call for enterprise security teams. While the security industry has spent the last year fixating on prompt injections and model jailbreaks, this breach highlights a far more systemic vulnerability. The weakest link in enterprise AI is not necessarily the model itself. It is the middleware connecting the models to your data.

HIPAA-Compliant Email Archiving: What Healthcare MSPs Need to Know in 2026

Email remains the primary communication channel in healthcare, carrying patient records, referral notes, billing data, and administrative correspondence that frequently contains electronic Protected Health Information (ePHI). For Managed Service Providers (MSPs) serving healthcare clients, HIPAA-compliant email archiving is no longer optional. It is a foundational requirement for supporting regulatory compliance, responding to audits, and protecting against data loss.

Governing Security in the Age of Infinite Signal - From Discovery to Control

Anthropic just open-sourced vulnerability discovery at scale. Now what? A few weeks ago, Anthropic launched Glasswing, a $100 million initiative to use AI to identify vulnerabilities at scale. Around the same time, they introduced Claude Mythos, a system that can autonomously discover and exploit software flaws. I wrote about this trajectory in my previous analysis: AI accelerates discovery, but enterprise trust still depends on deterministic validation, remediation automation, and governance at scale.

CVE-2026-0968: The libssh Heap Read That Isn't as Scary as Scanners Say

A missing null check in libssh’s SFTP directory listing code lets a malicious server crash clients, but real-world exploitability is extremely constrained. CVE-2026-0968 is an out-of-bounds heap read in sftp_parse_longname(), triggered when an SFTP client processes a crafted SSH_FXP_NAME response with a malformed longname field. Red Hat, which serves as the CNA (CVE Numbering Authority) for this vulnerability, scored it 3.1 (Low), while Amazon Linux independently scored it 4.2 (Medium).

AI Workload Baseline and Drift Detection: Defining "Normal" Agent Behavior

Security teams deploying AI agents into Kubernetes know they need behavioral baselines. The concept is straightforward: define what “normal” looks like for each agent, then detect when behavior drifts in ways that suggest compromise. The problem is that AI agents are designed to change. A model update alters inference latency. A prompt revision shifts tool-calling sequences. A new MCP integration adds API destinations nobody flagged during the last security review.