Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Nightfall DLP 2026: Corporate v. Personal Session Differentiation | Live Demo

See the future of data loss prevention in action. This live demo showcases Nightfall's breakthrough session differentiation technology that intelligently blocks sensitive file uploads to personal cloud accounts while seamlessly allowing them in corporate environments.

Ep 27: 2026 Security operations insights

On this episode of Masters of Data, we dive into our 2026 Intelligent Security Operations report. While 90% of 500+ security leaders see AI/ML cutting alert fatigue, actual implementation remains stuck at basic anomaly detection—not the full automation everyone wants. The gap is real: only 51% say their SIEM effectively reduces detection and response times, exposing serious maturity issues. Add rampant tool sprawl (most orgs run 3-10+ security tools that don't communicate), and you've got an integration nightmare. We explore how Model Control Protocol and AI agents could solve this, but here's the truth.

Emerging Threat: CVE-2026-24061 - Telnet Authentication Bypass in GNU Inetutils

CVE-2026-24061 is an authentication bypass vulnerability affecting the Telnet service provided by GNU Inetutils. The issue allows an unauthenticated remote attacker to bypass expected authentication checks and gain access to the Telnet service under certain conditions.

From IDE to CLI: Securing Agentic Coding Assistants

Today we’re excited to announce that Zenity now protects the most powerful, enterprise-critical coding assistants - Cursor, Claude Code, and GitHub Copilot - from build-time to runtime. As AI becomes a first-class developer tool, Zenity gives security teams the visibility and control they need to safely embrace coding assistants everywhere they’re used, in IDEs, CLIs or in the cloud.

CrowdStrike Named a Customers' Choice in 2026 Gartner Voice of the Customer for Endpoint Protection Platforms

In today's threat landscape, an effective endpoint protection platform (EPP) is the cornerstone of an organization’s security posture. Built on this foundation, the CrowdStrike Falcon platform has established itself as a pioneer of AI-native security, enabling organizations across every sector and size to unify and automate their defenses across endpoint, identity, cloud, and data.

CVE-2025-60021 (CVSS 9.8): Command injection in Apache bRPC heap profiler

This research is published following the public release of a fix and CVE, in accordance with coordinated vulnerability disclosure best practices. CVE‑2025‑60021, a critical command injection issue in Apache bRPC’s /pprof/heap profiler endpoint, was identified during broader analysis of diagnostic and debugging surfaces in the framework. The issue was discovered using Vulnhalla, CyberArk Labs’ AI tool that assists in triaging CodeQL results using an LLM.

Zero Trust for Data Privacy: The Backbone of Modern Cybersecurity

Data privacy used to be the realm of hospitals, banks, and fervent devotees of the Fourth Amendment to the US Constitution. Something we knew we wanted but conceptually assumed wouldn’t affect most people. Our dependence on the Internet for almost all aspects of daily life has changed that. In 2026, data privacy and cybersecurity are deeply intertwined. Protecting sensitive information isn’t just about stopping hackers.

MCP & AI Agent Security: Addressing the Growing Data Exfiltration Vector

The security landscape is shifting. For the past two years, security teams have focused primarily on what users type into chatbots by monitoring interactions with ChatGPT, Gemini, and Claude. But a new risk vector is emerging, one that operates largely outside traditional security controls: AI agents accessing corporate data autonomously through the Model Context Protocol (MCP).

VMware ESXi vs vSphere vs vCenter: Complete Comparison

VMware offers a wide range of products, and understanding their different use cases may be overwhelming. In this blog post, we cover the differences between three commonly used technologies in VMware environments: It’s important to note that any ESXi vs. vSphere vs. vCenter comparison should start with a caveat: these technologies are complementary rather than substitutes for one another. NAKIVO for VMware vSphere Backup Complete data protection for VMware vSphere VMs and instant recovery options.