Citrix NetScaler ADC and Gateway Vulnerabilities (CVE-2026-3055 & CVE-2026-4368)

On March 23, 2026, Cloud Software Group (Citrix) published a security bulletin disclosing two vulnerabilities in NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway). Both affect customer-managed on-premises deployments; Citrix-managed cloud services and Adaptive Authentication instances have been updated automatically. CVE-2026-3055 is an out-of-bounds read resulting from insufficient input validation in NetScaler ADC and NetScaler Gateway.

What You Need to Know about the QualDerm Partners Data Breach

QualDerm Partners, LLC is a healthcare management services provider headquartered in Brentwood, Tennessee. The company offers comprehensive administrative, clinical, and operational support to dermatology practices nationwide. QualDerm provides management resources, funding, and operational services, including patient records management, billing, insurance processing, and other essential services to improve efficiency and care quality across its network of clinics.

How to Gain Value from AI in Cybersecurity

The Terminator is often people’s reference point for artificial intelligence (AI), especially when they worry that technology will be the end of civilization. However, on the other end of the AI spectrum is the beloved, marshmallow fluff Baymax, the helper robot providing assistance to those in his presence. The reality of AI sits somewhere between these two extremes. For security teams, AI initially seemed like a revolutionary technology that would offer faster detection and automated analysis.

What You Need to Know about the Navia Benefit Solutions Data Breach

Navia Benefit Solutions, Inc. is a consumer-focused benefits administrator headquartered in Renton, Washington. Founded in 1989, the company provides comprehensive employee benefits administration services to more than 10,000 employers across the United States. Navia manages tax-advantaged healthcare and dependent care accounts, serving more than 1 million participants nationwide.

The 7 Best AI Governance Tools in 2026

AI adoption has accelerated faster than most organizations’ ability to manage it. Security and compliance teams are now responsible for overseeing machine learning models, large language models (LLMs), agentic AI systems, and shadow AI—often with frameworks and processes that weren’t built for any of it. The gap between deploying AI and governing it responsibly is where risk lives. AI governance tools exist to close that gap.

How to Choose the Right Database Replication Software

Your data lives in multiple environments, your teams expect near-zero downtime, and your compliance list keeps growing. Pick the wrong database replication software, and you’re not just dealing with slowdowns; you’re exposed when a real failure hits. Whether you’re replicating across Kubernetes clusters, hybrid clouds, or edge locations, this decision directly impacts recovery time, infrastructure costs, and operational risk.

Four Excuses That Are Leaving Your Data Exposed to AI Risk

The generative AI revolution isn't on the horizon. It's already reshaping the way your employees work. Across every industry, workers are adopting AI-powered productivity tools at a pace that far outstrips most organizations' security and governance programs. The question is no longer whether your organization will use AI, but whether you're prepared to use it securely. The challenge is real, but so are the misconceptions that keep organizations from taking action.

How 1Password is building a culture of AI fluency through AI champions

If 2025 was the year of AI adoption, 2026 is when AI evolves from a software story to a people story. Katya Laviolette, our Chief People Officer, explored this idea in a recent Forbes article about how 1Password’s internal network of AI Champions is shaping this evolution and helping us set the standard for how we use AI to drive impact across 1Password.

Are attacks on industrial systems increasing? #cybersecurity #podcast #OT

Public awareness of industrial system attacks is finally catching up to what security professionals have known for years. On The Cybersecurity Defenders Podcast, Justin Searle, Director of ICS Security at InGuardians, traces the shift from Conficker in 2008 taking out OT systems on flat networks to Stuxnet in 2010 making the warfare implications clear. Since then, awareness among governments and critical infrastructure operators has grown steadily, and so have the attacks.