Cyberhaven Product Launch: Uniting DSPM & DLP to Secure Data in the AI Era

AI is rewriting data risk. On Feb 3, see how to fight back. Every week, AI makes your team faster—and your data more exposed. Files jump between new tools, models train on sensitive inputs, and traditional DLP is blind to the context that matters most. On February 3 at 11:00 AM PST, we’re pulling back the curtain on Cyberhaven’s unified DSPM & DLP platform—and showing how a single, AI‑native platform can finally keep up with how data actually moves.

Best Container Security Solutions for 2026: From Scanning to Runtime Protection

What’s the difference between container scanning and container security? Scanning finds vulnerabilities in images before deployment—it’s container auditing, not container security. Real security requires runtime visibility: seeing what processes execute, what network connections occur, and what files get accessed while containers run. Most teams have scanning covered. Most teams are blind at runtime.

11 Best Identity and Access Management (IAM) Tools in 2026

As organizations scale across cloud, hybrid, and remote-first environments, identity has become the most critical security layer. Traditional perimeter-based security models are no longer effective against modern threats such as credential theft, phishing attacks, insider risks, and unauthorized access to SaaS applications. This shift has made Identity and Access Management (IAM) a foundational requirement for enterprises of all sizes.

Seeing What AI Touches: Introducing Data Lens

Security teams are entering a new phase of risk driven by the combination of AI agents and broad access to internal and external data. Agents are no longer limited to responding to prompts. They read files, pull documents from shared repositories, query external sources, and move information across systems on behalf of users. This shift brings real business value. Knowledge becomes easier to access, workflows move faster, and information that once required deliberate effort can be surfaced instantly.

Best Cloud Compliance Tools in 2026: From Audit-Prep to Runtime Verification

What are the three types of cloud compliance tools? Audit-prep platforms (Drata, Vanta) automate evidence collection for certifications. Security posture management/CSPM (Wiz, Prisma Cloud) scan configurations at a point in time. Runtime compliance verification (ARMO, Sysdig) monitors actual workload behavior continuously. Choosing the wrong type means solving for the wrong problem. What is compliance drift and why does it matter? The gap between your last scan and your current state.

The hidden cost of PKI: Why certificate failures aren't just an IT problem

For years, businesses have treated public key infrastructure (PKI) as background plumbing, quietly securing access across enterprise systems and devices, and rarely drawing executive attention unless something failed. New research from the Ponemon Institute suggests that those assumptions no longer hold.

Arctic Wolf Observes Malicious Configuration Changes On Fortinet FortiGate Devices via SSO Accounts

Starting on January 15, 2026, Arctic Wolf began observing a new cluster of automated malicious activity involving unauthorized firewall configuration changes on FortiGate devices. This activity involved the creation of generic accounts intended for persistence, configuration changes granting VPN access to those accounts, as well as exfiltration of firewall configurations.

Why Measuring Security ROI Matters

Security investment only matters if it can be measured. In this roundtable, Josh Jones makes a straightforward point: security leaders need a way to quantify whether their investments are actually producing outcomes that can be explained to executives and boards. That challenge isn’t about buying more tools. It’s about answering basic questions: What are our tools actually doing? Where are controls misaligned or underused?