Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding I/O Filters in VMware vSphere Environments

VMware vSphere offers a wide range of storage-related features for virtual machines. In addition to VMware vSAN and Virtual Volumes, VMware I/O filters are effective for VM administration since they unlock advanced features for different scenarios. This blog post explains what VMware I/O filters are, how they work and when to use them. NAKIVO for VMware vSphere Backup Complete data protection for VMware vSphere VMs and instant recovery options. Secure backup targets onsite, offsite and in the cloud.

AI-Powered Human Risk Management Shifts the Focus to Adaptive, Behavior-Based Training

Human risk management (HRM) focuses on one of the most persistent cybersecurity vulnerabilities: humans. Social engineering attacks that trick users into taking risky actions are a factor in 98% of cyberattacks not because they are technically complex, but because they manipulate employee behavior. Unlike traditional, one-size-fits-all security awareness training, human risk management focuses on changing employee behavior through monitoring and targeted reinforcement.

Campaign Mode: Because Your SOC Team Has a Life

In the world of cybersecurity, busy is an understatement. SOC teams are often drowning in a sea of repetitive alerts. Looking at the same threat or graymail spread across 50 pages of logs isn't just tedious, it’s a drain on your most valuable resource: time. That is why we are introducing Campaign Mode for KnowBe4 Defend. It’s time to stop chasing individual emails and start managing at scale.

LevelBlue Resilience Retainer Named 2026 SC Media Awards Europe Finalist for Best Incident Response Solution

LevelBlue is proud to share that we’ve been shortlisted as a finalist for the 2026 SC Media Awards Europe for our recently launched Resilience Retainer, recognized in the Best Incident Response Solution category. The SC Media Awards Europe program honors organizations that demonstrate outstanding leadership, innovation, and excellence across the cybersecurity landscape.

Discover Your Network's Blind Spots Before It's Too Late

Advanced threats rarely break into infrastructure in obvious ways. In many cases, they remain hidden for months, exploiting blind spots created by unmanaged personal devices (BYOD), applications adopted without the IT department’s oversight (shadow IT), unauthorized access points, or compromised devices operating as part of botnets. As networks evolve into hybrid environments and most traffic is encrypted, the context becomes fragmented and the attack surface expands.

The 5 best HIPAA compliance software options for 2026

Accelerating security solutions for small businesses‍ Tagore offers strategic services to small businesses. A partnership that can scale‍ Tagore prioritized finding a managed compliance partner with an established product, dedicated support team, and rapid release rate. Standing out from competitors‍ Tagore's partnership with Vanta enhances its strategic focus and deepens client value, creating differentiation in a competitive market.

What RSAC 2026 Actually Told Us About Your Security Debt

I recently attended the RSA Conference 2026 (RSAC 2026) in San Francisco. I have been attending and speaking at RSAC for a long time, and every year I try to figure out what actually changed versus what just looks new. This year felt different, but not in the way the expo floor would suggest.

Microsoft Advancing Windows Driver Security: Ending Cross-Signed Kernel Driver Trust

Microsoft is preparing a major change to Windows that could quietly reshape how security and compatibility are balanced across the entire ecosystem. Starting April 2026, Windows will begin blocking kernel drivers signed through the legacy cross-signed root program by default, replacing a decades-old trust model with a stricter, policy-driven approach centred on the Windows Hardware Compatibility Program (WHCP). This is more than a routine update.

Secure What Matters: Scaling Effortless Container Security for the AI Era

In November, we shared our vision for the Future of Snyk Container, outlining a fundamental shift in how teams secure the modern container lifecycle. We promised a future where security doesn’t just “scan” but scales effortlessly with the speed of the AI-driven, agentic world. Today, we are thrilled to announce that we are moving from vision to reality.