CrowdStrike Advances CNAPP with Industry-First Adversary-Informed Risk Prioritization

Interest in cloud-native application protection platforms (CNAPPs) has exploded over the recent years, partly due to their ability to reduce alert noise by translating siloed misconfigurations into correlated, theoretical attack paths and exposures. While many organizations have adopted these solutions in pursuit of outcomes like zero critical issues, cloud breaches continue to rise.

Sophos Firewall ranked the #1 overall firewall solution in G2's Spring 2026 reports

Sophos Firewall ranked the overall firewall solution in G2’s Spring 2026 reports Why organizations are choosing Sophos Firewall to reduce exposure and strengthen resilience When organizations evaluate security products, they want real‑world proof of reliability, protection, and ease of management.

LevelBlue and SentinelOne: Advancing Integrated, IntelligenceDriven Security Operations

Today, I’m excited to share news that represents a major step forward in how LevelBlue helps organizations strengthen their resilience and modernize their security operations. LevelBlue and SentinelOne have entered into a strategic global partnership to deliver integrated, intelligence‑driven security operations and incident response for organizations worldwide.

The 6 Best AI Insider Threat Monitoring Tools in 2026

Organizations have spent years hardening their perimeters against external attackers. Yet some of the most damaging breaches today originate from within. Insider threats—whether from disgruntled employees, compromised accounts, or AI agents—are responsible for a growing share of data loss and costly security incidents. Traditional security tools weren’t built for this reality.

Falcon Data Security Secures Data Wherever It Lives and Moves

In modern organizations, sensitive data lives everywhere and is constantly moving. It is created, accessed, transformed, and shared across endpoints, browsers, SaaS applications, cloud services, GenAI tools, and agentic workflows. CrowdStrike is introducing CrowdStrike Falcon Data Security to protect data across constantly evolving business environments.

The AI Control Gap: Why Partners Are Now on the Front Line

For channel partners, AI has quickly moved from a future conversation to a current customer problem. Clients are already using AI across their organisations, often faster than governance can keep up. What’s emerging is not just another technology trend, but a new class of risk that customers cannot fully see or control. Our latest research, based on insights from senior security leaders in highly regulated industries, highlights the scale of the issue.

Analyzing FAUX#ELEVATE: Threat Actors Target France with CV Lures to Deploy Crypto miners and Infostealers Targeting Enterprise Environments

Securonix threat researchers have been tracking an ongoing campaign targeting French-speaking corporate environments through fake resumes. The campaign uses highly obfuscated VBScript file disguised as resume/CV documents, delivered through phishing emails. Once executed, the malware deploys a mutli-purpose toolkit that combines credential theft, data exfiltration, and Monero cryptocurrency mining for maximum monetization.

Securing the AI That Runs the Enterprise: Zenity + ServiceNow SecOps

As agents take on more responsibility, they also introduce a new class of security challenges, ones that traditional tools weren’t built to handle. This is why Zenity and ServiceNow have partnered to bring end-to-end agent security directly into ServiceNow SecOps, where security teams already operate.

WebPromptTrap - New Indirect Prompt Injection Vulnerability in BrowserOS

Cato researchers have discovered a new indirect prompt injection exploit pattern workflow in BrowserOS (an open-source agentic AI browser). We named it “WebPromptTrap” because the prompt originates from untrusted web content and it traps users into approving an authorization step through a trusted-looking AI summary.