Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sponsored Post

Ten threats traditional Antivirus misses (and Next-Gen AV doesn't)

The cybersecurity arena is rapidly shifting and CISOs are locked in a relentless struggle against adversaries who rarely reveal themselves. Traditional antivirus (AV) solutions, which has been the primary shield (and still is for many companies) has reached its 'End of life'. The reason is clear: signature-based protection simply isn't enough anymore.

One Identity Appoints Gihan Munasinghe as Chief Technology Officer

One Identity, a leader in unified identity security, today announced the appointment of Gihan Munasinghe as Chief Technology Officer. Munasinghe brings more than 15 years of experience leading global engineering organizations and delivering large-scale, customer-centric software platforms. In this role, he will lead the engineering organization and set technology strategy, prioritizing innovation that best serves customers as their security, operational, and deployment needs evolve.

MomentProof Deploys Patented Digital Asset Protection

MomentProof, Inc., a provider of AI-resilient digital asset certification and verification technology, today announced the successful deployment of MomentProof Enterprise for AXA, enabling cryptographically authentic, tamper-proof digital assets for insurance claims processing. MomentProof's patented technology certifies images, video, voice recordings, and associated metadata at the moment of capture, ensuring claims evidence is protected against AI-based manipulation, deepfakes, and other malicious digital alterations.

Third Party Supplier Security: Are Your Vendors Safe?

Your third party suppliers probably aren’t as secure as you think they are. SecurityScorecard’s 2025 Global Third Party Breach Report found that at least 35.5% of all data breaches in 2024 originated from third party compromises. That’s not a minor risk you can ignore. The numbers tell a stark story. But here’s what most organisations miss: the real figure is likely higher since many breaches aren’t disclosed or are mistakenly reported as internal incidents.

The Monetary Authority of Singapore (MAS) on AI Risk Governance

‍ ‍The Monetary Authority of Singapore's (MAS) Consultation Paper on Guidelines on Artificial Intelligence Risk Management, released in November 2025, dramatically altered how AI is positioned within the country’s financial supervision. The document states that the proposed Guidelines "set out MAS' supervisory expectations relating to AI risk management in financial institutions (FIs)" (p.3).

Tanium Basics - Console Navigation, No Compass Needed - Tanium Tech Talks #154

New to Tanium or just need a refresher? In this Tanium Basics kickoff episode, Jesh and Alex walk through the console UI - from environment status to modules and shortcuts - so you can navigate with confidence! What you’ll learn: Environment Status panel provides quick‑hit visibility Question Bar and Search Endpoints streamline activities Quick Links save significant time Tanium Ask enables natural language queries Modules & Shared service navigation supports core workflows Administration menus offer insight & operational controls The power of Question Builder.

What's New With Keeper | February 2026

The Keeper Security Government Cloud (KSGC) platform has been authorized at the FedRAMP High baseline, enabling federal civilian agencies to protect high-impact unclassified data as defined under FIPS 199 and FedRAMP High baselines. The “High Impact” designation applies to systems where unauthorized access or disruption could cause severe or catastrophic harm to agency operations, assets or individuals.

AI Principles in Practice: Auditability in non-negotiable

When AI acts on your behalf, auditability is non-negotiable. In the latest Principles in Practice video, Anand Srinivas, 1Password VP of Product & AI, explains why every AI agent action involving credentials must leave a clear audit trail: Who approved the access and why When and where were credentials used What did the agent access and when Did access end when the task was completed Without auditability, AI usage can break trust between employees, security teams, customers, and regulators.

Anomaly Detection with Machine Learning to Improve Security

Being a security analyst can feel like being trapped in a Where’s Waldo book. You can find yourself staring at a data stream looking for something that “isn’t like the others.” However, as your organization collects and correlates more data from the environment, finding the Waldo can feel overwhelming. In a modern IT environment, organizations have hundreds or thousands of devices, users, and data points that they need to correlate so they can identify normal network activity.