CYJAX vs. SOC Radar: Different Approaches to Cyber Threat Intelligence

A detailed comparison of CYJAX and SOC Radar, exploring differences in automation, analyst-led investigations, RFIs, and intelligence depth to help security teams choose the right CTI platform. When organisations evaluate cyber threat intelligence platforms, the differences often go far beyond feature lists. They come down to philosophy, depth, and how intelligence is actually used in high-pressure environments.

Inside Modern API Attacks: What We Learn from the 2026 API ThreatStats Report

API security has been a growing concern for years. However, while it was always seen as important, it often came second to application security or hardening infrastructure. In 2025, the picture changed. Wallarm’s 2026 API ThreatStats Report revealed that APIs are now the primary attack surface for digital business, and not because bad actors discovered new zero-days, but because of compounding failures in identity, exposure, and abuse.

Human Risk Management and Security Awareness Training

A notable statistic continues to shape the cybersecurity research landscape: the human element remains involved in roughly 60% of all confirmed breaches. That’s according to the 2025 Verizon Data Breach Investigations Report (DBIR), which found that social engineering actions like phishing, pretexting, and credential misuse are consistently intertwined with today’s most common attack paths, even when they are not the first visible technical vector.

Corelight at SC25: A laboratory for securing the fastest conference network

I’ve worked as a threat hunter in several Black Hat Security Conference Network Operations Centers (NOCs) across the globe. So I didn’t expect to be surprised by much when signing on to be a part of the NOC for SCinet—a conference that has the “fastest conference network in the world.” And yet I was surprised by just how diverse the SCinet NOC team was, how collaborative the environment was, and how much we were able to achieve with automation in such a short amount of time.

The Attackers Lens The Hidden Path To Largescale LLM Exploits

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Customer Insights with Clark Pichon, Security Operations Center Manager

In this video, Clark Pichon, Security Operations Center Manager, shares how they're leveling up security operations with the help of AI and automation. From building queries faster using Dojo AI to cutting down time-to-detection and closing alerts more efficiently with SIEM automation, see how these tools are helping the team work smarter and respond faster than ever before.

Privileged Access as a Growth Strategy in a Perimeterless World

Cybersecurity is no longer just an IT concern; it is now a strategic priority in the boardroom. As enterprises operate without a fixed perimeter, depend on cloud providers for infrastructure and build partnerships across digital ecosystems, controlling access to critical systems and data has become essential to doing business. Privileged Access Management (PAM) plays a key role in securing this new environment.

GA4 Is Collecting PHI from Your Website and a BAA Won't Fix Your HIPAA Problem

Conversations about GA4 in healthcare tend to stay strangely shallow, circling the same procurement question: “Is there a BAA?” It’s as if GA4 creates risk at the contract layer, when the truth is that the risk is born earlier and lower, in the collection layer, where ordinary telemetry becomes sensitive the moment it is attached to health context and allowed to leave your site.

Securing the New Control Plane: Introducing Static Scanning for AI Agent Configurations

Today, Mend.io is proud to announce the launch of AI Agent Configuration Scanning, integrated directly into the Mend AI Scanner. By treating “Agents as Code,” we are bringing security visibility and CI-friendly enforcement to AI configurations before they reach production The rapid adoption of AI agents has transformed the modern developer workflow.