Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Website vs Device Defenses: How to Build a Modern Account Takeover Solution

Most account takeover solutions are built on a familiar assumption: if you can trust the device and secure the login, you can stop fraud. That assumption is no longer valid. Modern account takeover failures are driven by a structural issue most defenses still miss: the legitimacy gap. This is the period when access is treated as legitimate even though compromise has already occurred. During this gap, attackers operate freely while security and fraud teams see nothing actionable.

Exploit Intel & Detected Products - Tanium Comply - Tanium Tech Talks #153

Cut through vulnerability noise! Learn how Tanium Comply’s new Exploit Intel, Endpoint Criticality, and Detected Products help you prioritize and remediate faster. What you’ll learn: Why CVSS alone isn’t enough How EPSS and exploit maturity change the game Dynamic criticality rules for business impact Detected Products for pinpoint remediation Visualize risk with the Exploitability Dashboard.

EP 23 - Red teaming AI governance: catching model risk early

AI systems are moving fast, sometimes faster than the guardrails meant to contain them. In this episode of Security Matters, host David Puner digs into the hidden risks inside modern AI models with Pamela K. Isom, exploring the governance gaps that allow agents to make decisions, recommendations, and even commitments far beyond their intended authority.

Stop buying niche tools to secure your AI. #cybersecurity #aisecurity #engineering

In his first prediction for 2026, Ev explains why that strategy is about to fail. We used to let microservices run anonymously because we had bigger fires to fight. But when all software becomes autonomous AI, anonymity is a risk you can't afford. If your software behaves like a human, why separate it from your human identity strategy? The future isn't "NHI." It's a Unified Identity Layer where humans and non-humans are managed as equals.

How Attack Surface Monitoring Improves Mean Time to Detect (MTTD)

Even with modern security tools, many organizations detect threats far too late. Attackers often operate quietly for extended periods because early warning signs go unnoticed. Exposed assets, forgotten services, misconfigured cloud resources, and unmanaged SaaS integrations rarely trigger immediate alerts. This delay increase means time to detect because security teams typically respond only after suspicious behavior reaches internal systems.

The missing piece of the CIA triad: Why 'availability' matters

We are often obsessed with who can see our data(Confidentiality) and how that data is protected from tampering (Integrity). While these are vital, there is a third pillar of the CIA triad that is currently under constant pressure: Availability. A recent Forrester survey revealed a startling reality: 76% of data breaches now affect availability, while only 42% impact confidentiality and 27% affect integrity.

2026 Insider Risk Predictions: What Organizations Must Prepare For

As 2026 unfolds, insider risk is being redefined by AI, behavioral analytics, and cross-functional accountability. The ability to predict risk based on behavior and intent, rather than react to outcomes, is reshaping how organizations defend against internal threats. Meanwhile, persistent factors like hybrid work continue to complicate visibility and oversight, amplifying risk across modern environments.

How Agentic AI Creates Shadow APIs: Security Risks Explained

How Agentic AI Creates Shadow APIs: Security Risks Explained As businesses move from static applications to Agentic AI, the security landscape is shifting beneath our feet. In this clip from the A10 Networks webinar, "APIs are the Language of AI: Protecting Them is Critical," experts Jamison Utter and Carlo Alpuerto discuss a new frontier in cybersecurity: AI that builds its own APIs.