A New Data Age Demands A New Way of Thinking About DSPM

We are living through one of the most profound shifts in how humans interact with information. Everyone is talking about AI for productivity, but this moment is so much bigger than that. We are witnessing a once-in-a-lifetime change in how knowledge, insight, and decision-making are embedded into every aspect of business and human life.

Top Cloud-Native Security Practices Every Organization Should Follow

Although cloud-native environments drive modern innovation and enable scalability, they also introduce new vulnerabilities that traditional perimeter-based security models cannot address. According to Orca Security’s 2025 State of Cloud Security Report, 95% of organizations have at least one cloud asset that enables lateral movement, making it easier for cybercriminals to navigate cloud environments undetected.

GLM 4.7 vs. The Giants: Is This the New King of AI Coding?

Can a lesser-known model compete with the likes of OpenAI, Google, and Anthropic? In this video, we put Z.ai’s GLM 4.7 to the ultimate test. We task it with building a production-ready, secure Node.js note-taking application from a single prompt to see if its code quality and security stand up to the big name foundational models.

Let's Encrypt is moving to 45-day certificates before everyone else

The CA/Browser Forum set 47-day certificates as target for 2029. Let’s Encrypt decided to implement it a year earlier. In December 2025, Let’s Encrypt announced their roadmap to cut certificate lifetimes from 90 days to 45 days by February 2028, a full year ahead of the industry mandate. It’s exactly what we’d expect from the CA that made automation mandatory from day one.

Why CVEs Alone Don't Explain Risk | Ed Amoroso & Garrett Hamilton on Actionable Security

Vulnerability data isn’t the starting point. Context is. Ed Amoroso and Garrett Hamilton unpack why CVEs on their own don’t explain risk. What matters first: ⇢ What assets actually exist⇢ How controls are deployed and configured⇢ What the live posture looks like, not last month’s report With that context in place, vulnerabilities stop being noise and start becoming decisions. Garrett also makes a critical point near the end: many security tools are excellent at producing findings, but far less effective at helping teams resolve them.

Intel Chat: Visual Studio Code, Sinkholes reversal, Chinese pen-testing & FortiSIEM zero-day [286]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Proud to be Data Privacy Week 2026 Champions with the National Cybersecurity Alliance

We are proud to be Data Privacy Week 2026 Champions with the National Cybersecurity Alliance. Stay tuned all week as we share practical tips, real-world insights, and expert perspectives from our teams and special guests across WatchGuard Tech All-Stars. A few simple reminders to start: Privacy is about choice, awareness, and control. And it starts with the everyday decisions we all make online.

Dawn Cappelli on the global threat environment

The gloves are off: the threat environment has escalated! Global conflicts have led to a surge in cyberattacks targeting critical infrastructure. Tune in to the latest episode of the Data Security Decoded podcast for a fantastic conversation with Dawn Cappelli that covers rising global tensions, the rapidly evolving threat landscape, and how to secure OT environments from bad actors. Subscribe to our channel and never miss an episode!

When Sensitive Data Becomes a Picture: Introducing ML-Powered Image Classification for DLP

Dr. Carter finishes a long shift at the hospital, exports a patient X-ray as a regular image file, and drags it into an AI assistant to double-check a diagnosis. The image included the patient’s name and ID. Across town, Jason, a travel agent, scans a stack of passports and uploads the images to an AI tool to automatically fill bookings. In a support center, Sarah snaps a quick photo of a credit card and sends it to an AI service to avoid retyping the number.