NSW Treasury Breach, ABAC, and Principles of Least Privilege

Recent headlines heralded another unfortunate security breach: an employee of the NSW Treasury in Sydney, Australia, illegally downloaded more than 5,600 sensitive government documents, which were later recovered at his home. This was labeled a “significant cyber incident” by the NSW government and had been detected by an internal security monitoring tool that detected “movement of a large cache of documents”.

Data privacy in 2026: What to expect

When exploring the regulatory environment, data privacy continues to be a critical area of focus for organizations worldwide. With rapid advancements in artificial intelligence, the proliferation of connected devices, and the increasing sophistication of cyber threats, safeguarding personal information has never been more critical. Governments worldwide are responding with stringent regulations, while consumers are becoming more discerning about how their data is collected and used.

Autonomous Pentesting: How it Works, Benefits, Tools (2026)

For years, the defensive side held the asymmetric advantage over threat actors. Writing exploits requires a deep understanding of how memory corruption works, how authentication tokens can be forged, etc. That knowledge gap is what made it hard to exploit a vulnerability. LLM proliferation lowered that floor and quickly removed that advantage. Even script kiddies can now carry out cyberattacks like APTs without understanding POC.

Agentic SecOps: Build a security AI agent that automatically investigates detections

A credential access event fired. An AI agent investigated it, correlated it against running processes, assessed the risk, and closed the ticket. No analyst touched it. The entire loop ran in minutes. This is what security operations look like when AI can actually operate in the environment rather than advise from outside it. Security operations have always required a special kind of person.

The Silent Data Problem in Hospitals

We’ve all been there: a temporary file created for a claim gets saved and forgotten. Ten years later, that "temporary" file is a massive liability. Stephen Bader from Powers Health shares how they are tackling sensitive data sprawl. It’s not malicious; it’s just how work happens. But identifying and securing that PHI is a multi-year project every healthcare system needs to start today. Hear how Powers Health is cleaning up their data footprint with Josh Howell.

The $700 million question: How cyber risk became a market cap problem

Cyber risk used to be the kind of problem you could delegate. Something for the CISO, the IT team, and maybe an external auditor to worry about once a year. That comfort zone is gone. In the last decade, a new reality has set in: a single cyber incident can erase hundreds of millions of dollars in market value in a matter of days, derail strategic plans, and permanently rewrite how investors see a company.

Introducing Atlas: a global age regulation tracker

Over 300 age-related bills were introduced across several US states in 2025 alone. We’ve heard firsthand from numerous legal and compliance teams that keeping up with these regulations is incredibly overwhelming. That’s why we developed Atlas, a global database tracking evolving age assurance regulations. Atlas tracks recent legislation impacting social media platforms, adult content, age-restricted services, and other related legislation.

CrowdStrike Named a Leader in Frost & Sullivan 2026 Radar for Cloud-Native Application Protection Platforms

We're proud to announce that Frost & Sullivan has named CrowdStrike a Leader for the fourth consecutive time in the 2026 Radar for Cloud-Native Application Protection Platforms. This recognition validates our continued investment in combining posture management with real-time detection and response, and reinforces our leadership in stopping cloud attacks.

The Configuration Drift Behind the Teams Helpdesk Breach

On April 22, 2026, Google's Threat Intelligence Group and Mandiant disclosed a campaign by a threat actor they're tracking as UNC6692. The group breached enterprise networks by impersonating IT helpdesk staff over Microsoft Teams, ultimately exfiltrating Active Directory databases and achieving full domain compromise. What's notable about UNC6692 is what they didn't do. They didn't use a zero-day. They didn't exploit a software vulnerability.