Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Selling to Regulated Customers: 5 Requirements You Need to Know and Prove

So you’ve got a groundbreaking product that has outstanding market fit. Your prospects love it and are raring to buy. Amazing. But before they can hit approve on the order, they need to make sure you’re SOC 2 or ISO 27001 compliant because their compliance officer won’t let them work with any vendor that hasn’t passed their audit. This is the joy of selling to regulated customers — which today, let’s be honest, is almost everyone.

6 Data Governance Principles You Need to Know

At some point, something bad always happens. Incidents like NHI sprawl and data ownership are always preventable. A supply chain attack finds its way either through upstream infiltration or downstream delivery. However, despite being aware of this, the problem persists. 54% of large organizations see supply chain challenges as a barrier to cyber resilience. There is complexity and interdependency among different systems, software, and teams that require access to one another.

Expanding programmatic access to 1Password

The era of secrets living in fixed systems and accessed through a handful of workflows is long gone. Modern development is faster, more automated, and increasingly AI-assisted. Developers need access to secrets everywhere their code runs – across CI/CD pipelines, local environments, and AI-driven workflows.

SafeBreach's Evolution into an AI-First Development Team: Part I

In this first installment of a series on the transformation of SafeBreach’s development organization, VP of Development Yossi Attas outlines how his team is managing the strategic shift toward an AI-First development methodology. This includes moving beyond simple tool adoption to a fundamental redefinition of the software engineer’s role. Read on as we explore.

EventLog-in: Propagating With Weak Credentials Using the Eventlog Service in Microsoft Windows (CVE-2025-29969)

While attackers often find low-privileged credentials after creating a process dump of LSASS or harvesting hashes with a tool like Responder, they are rarely able to do anything with those credentials (RDP aside). We set out to discover how malicious actors might exploit Microsoft Windows remote procedure call (RPC) protocols to gather data remotely as a low-privileged user using RPC as an attack surface.

Disclosure: XWiki CSS Injection (CVE-2026-26000)

During independent security research, a CSS injection vulnerability (CVE-2026-26000) was identified in the XWiki platform. XWiki is an open-source enterprise wiki and collaboration platform commonly used for internal documentation and knowledge management. According to XWiki, the platform has over 8,000 active installations and is used by organisations such as Lenovo and Amazon, meaning vulnerabilities can affect a large and diverse user base.

AWS and Cloudflare Outages: How GitProtect Keeps Your Operations Running

The assumption that you’re ‘too big to fail’ or ‘too small to get noticed’ simply doesn’t hold water anymore. The year 2025 showed us once again that even the largest names on the market are not invincible. The same is true for any company that depends on their infrastructures. Without a real Plan B, your business’s reliance on cloud tech giants might be risky.

Empowering CISOs with AI: Discover powerful hopes and real risks

Artificial intelligence has become the ultimate paradox for today’s security leaders: it is simultaneously their sharpest new instrument and their biggest emerging attack surface. As boards push hard to “put AI everywhere,” CISOs must balance innovation with accountability, often in environments where AI pilots are already live before security is invited to the table.

Why Financial Clarity Matters Long Before Tax Deadlines

Taxes tend to dominate financial conversations. Deadlines. Deductions. Filings. Penalties. For many business owners, tax season feels like a recurring storm - predictable yet stressful. But hidden beneath that anxiety is a deeper issue few companies address early enough: Tax stress is often a bookkeeping problem in disguise. Because taxes are not created at filing time. They are created quietly, daily, through financial records.