Supervised AI Is the Fastest Path to Better Threat Triage ROI

Security operations teams are under sustained pressure. Alert volumes continue to rise, environments grow more distributed, and experienced analysts remain scarce. Much of the industry conversation around AI focuses on autonomy and fully automated response. That focus skips the most reliable efficiency gains available right now.

EP 22 - Security at the speed of innovation: Breaking down legacy barriers

How are defenders supposed to keep up when attackers move at the speed of AI? In this episode of Security Matters, host David Puner welcomes Rick McElroy, founder and CEO of Nexasure, for a candid conversation about cybersecurity’s breaking point. Together, they unpack the realities of defending organizations in an era of identity sprawl, machine risk, agentic AI, and relentless automation.

API Security in the Education Sector: Protecting the Digital Learning Ecosystem

Recent research shows that the education sector now faces over 4,300 cyberattacks per week per organization, a 41% year-on-year increase. Education also consistently ranks among the top three most targeted industries globally, driven by the volume of sensitive student data and heavy reliance on cloud-based learning systems.

Stop secrets before they leave your laptop (Git hooks + ggshield install)

Let's look at Git hooks, which is where ggshield really starts paying off in day-to-day developer workflow. Git hooks are built-in automation in Git. When certain events happen, like committing or pushing, Git checks for specific files inside the.git/hooks folder. If a hook file exists, Git runs it automatically. For example, if there’s a file named pre-commit, Git will execute it every time you commit.

How Threat Intelligence Builds Shared Responsibility in Cybersecurity

Recent high-profile incidents, such as attacks in the retail sector or the closure of KNP following a devastating breach, have pushed cybersecurity onto the boardroom agenda. However, as it rises in visibility, a fundamental misunderstanding persists about how protection works. Responsibility for security is frequently concentrated on a few individuals.

Top Git Hosting Services for 2025

Choosing different IT services is like choosing a car. Apparently, all cars have four wheels, an engine, and they can be driven. But in the end, differences are much bigger, and the final choice depends on many factors. Of course, we always take into account the price, but not only. First of all, the choice depends on the purpose and usability. After all, we will not take a sports car to drive on muddy forest roads. Personal preferences and habits also matter.

EP 22 - Security at the speed of innovation: Breaking down legacy barriers

How are defenders supposed to keep up when attackers move at the speed of AI? In this episode of Security Matters, host David Puner welcomes Rick McElroy, founder and CEO of Nexasure, for a candid conversation about cybersecurity’s breaking point. Together, they unpack the realities of defending organizations in an era of identity sprawl, machine risk, agentic AI, and relentless automation. Rick shares hard-won insights from decades on the front lines, challenging the myth of perfect defense and revealing why identity remains at the root of most breaches.

What The New CMMC Rules Mean For DoD Contractors

If your organization does business with the U.S. Department of Defense, or plans to, you need to know about a major change that just went into force. CMMC, or Cybersecurity Maturity Model Certification, is the Department of Defense’s standard for ensuring contractors meet basic cybersecurity requirements. It was designed to protect sensitive government data across the entire defense supply chain. As of November 2025, CMMC is no longer optional.

Navigating Workspace Compliance: Best Practices for Enhanced Security

Staying compliant is essential for protecting your organization from unexpected costs and reputational damage. As regulations grow more complex, businesses must ensure consistent adherence to security and data protection standards. With the rise of hybrid and remote work, solutions like Acronis Protected Workspace provide a secure, controlled environment designed to help organizations meet evolving compliance needs with confidence.