Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Empower your audits: Nextgen technology for powerful GRC assurance

Auditing in a digital environment is far more than a routine checklist exercise. With rapid technological evolution and an increased emphasis on transparency, enterprises are under mounting pressure to ensure robust governance, risk management, and compliance (GRC). Next‑gen technology is fundamentally reshaping audits, offering the promise of enhanced accuracy, efficiency, and insights that drive proactive decisions.

Episode 2 - Inside the Black Hat NOC: Defending a hostile conference network

Richard Bejtlich talks with Corelight Principal Technical Marketing Engineer Mark Overholser about what it takes to run the Black Hat Network Operations Center and keep a “hostile” training network safe. They walk through how partners like Corelight, Cisco, Palo Alto Networks, Arista, and Lumen build and monitor the conference network, how the team tells lab traffic from real infections, and why misconfigured self hosted services still show up in surprising ways.

Multimodal Attacks and Model Drift: The Future of AI Exploitation

Multimodal Attacks and Model Drift: The Future of AI Exploitation A10 security experts Jamison Utter, Diptanshu Purwar, and Madhav Aggarwal discuss the critical vulnerabilities emerging from multimodal AI agents (systems that perceive, decide, and act) and the absolute need for security mechanisms external to the Large Language Model (LLM) itself. The experts dive into why traditional security is failing and what the next evolution of defense must look like.

How penetration testing supports ISO 27001 certification

ISO 27001 provides a comprehensive framework to ensure organisations understand and manage their information security risks, and validates that appropriate controls are in place to mitigate those risks. Penetration testing plays a critical role in this process by validating security measures and exposing vulnerabilities before they become incidents.

Proactively Identify and Eliminate Defensive Weaknesses with Cybersecurity Domain-Specific AI

AI is everywhere. I live in San Francisco, and a day doesn’t go by that I don’t see a billboard, an advertisement on the side of a bus, or a tech bro’s hoodie with two big letters on it: AI. It’s no different in cybersecurity marketing – AI terminology is everywhere. But too often, it’s tacked on as a buzzword – a thin layer washed on top of existing security tools, with little real impact. This makes it tricky to decipher what’s real and what’s hype.

Now available via Renaissance: 1Password Enterprise Password Manager - MSP Edition

We’re excited to announce that today, 1Password Enterprise Password Manager – MSP Edition is now available through Renaissance, a leading IT distributor serving MSPs across the Island of Ireland. This partnership enables even more MSPs to access 1Password through local channels, streamlining their procurement and billing processes while expanding access to enterprise-grade credential security.

Searching Certificate Transparency Logs (Part 2)

In the last post we discussed why we’re building our own Certificate Transparency (CT) search tool. There’s good background on the CT ecosystem in that post, so check it out if you haven’t. This post assumes a certain understanding of terminology covered previously. Now that we know where the CT logs live, and the different kinds of logs, we need to start reading them.

Introducing The GitGuardian IDE Extension for VS Code, Cursor, Antigravity, And Windsurf

Ship fewer secrets with your code. In this video we walk you through installing and using the GitGuardian IDE extension in Visual Studio Code, Cursor, Antigravity, Windsurf, and any VS Code compatible editor. You will see how the extension uses ggshield, the GitGuardian command line tool, to scan for 500+ types of secrets and catch plaintext credentials as soon as you save a file, long before they can be committed.