Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Exposing Salt Typhoon on the network using the PEAK Threat Hunting Framework

How do you find an adversary who lives where you can't easily look? A recent CISA advisory on the state-sponsored actor "Salt Typhoon" highlights this exact challenge. These actors aren't just breaking in; they're moving in. They persist on network edge devices like routers and firewalls—critical infrastructure that often sits outside the view of traditional endpoint security. From this vantage point, they capture traffic, steal credentials, and plan their next move.

Are you blind to the next big firewall exploit? Warning signs and lessons learned from the recent Cisco exploit

It feels like the security world is caught in a recurring cycle. We see a spike in strange scanning activity, file it away as internet background noise, and then weeks later, a major zero-day exploit drops, targeting the very technology that was being scanned. The recent Cisco ASA vulnerabilities were a textbook example of this pattern. A September 4, 2025, report from GreyNoise highlighted a massive surge in scanning, with over 25,000 unique IPs probing Cisco ASA devices.

CrowdStrike 2025 APJ eCrime Landscape Report: A New Era of Threats Emerges

The eCrime threat landscape in the Asia Pacific and Japan (APJ) region is quickly evolving, driven by a mix of regional and global adversaries. From Chinese-language underground marketplaces facilitating the sale of stolen data and illicit services, to a rise in AI-developed ransomware campaigns, threat actors across the region are seeking new ways to scale and accelerate their operations.

OpenAI Data Privacy Compared: OpenAI, Claude, Perplexity AI, and Otter

AI assistants and search tools are woven into daily work. But not all providers handle your prompts, files, or transcripts the same way. Small policy details determine whether your data trains future models, how long it’s kept, and what an auditor will see. If you use these tools in regulated environments, the safest choice to ensure OpenAI data privacy often depends on your specific channel: consumer app, enterprise account, or API.

The End of VPNs: Why Zero Trust Is the Future of Remote Access

The virtual private network (VPN) has been the default way to connect remote employees to company resources for over two decades. In its time, the VPN was a breakthrough ‒ creating encrypted tunnels back to the corporate network and giving road warriors a way in. But today's workplace looks very different. Employees access SaaS applications directly from the Internet. Teams are distributed around the world.

Protegrity Developer Edition Setup | Lightweight, Local, and Fast

Most developers know the pain of setting up enterprise security software—hours of dependencies, complicated installs, and endless permissions that slow projects down before they even start. Protegrity Developer Edition is different. It installs the way developers work: lightweight, local, and fast. In this demo, Dan Johnson, a software engineer at Protegrity, walks through the complete setup process.

The Essential Definition of AI Agents: Tools, APIs, and Workflow Automation

In this video segment from Securing AI Part 3: AI Agents – Use Cases and Security, A10 security experts, Jamison Utter, Diptanshu Purwar, and Madhav Aggarwal explore the topic of securing AI agents, which they define as systems that perceive, decide, and act. Diptanshu Purwar starts with a fundamental definition of an AI agent, clearly distinguishing it from a simple chatbot and setting the stage for the security challenges discussed in the series.