Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike Advances Next-Gen SIEM with Threat Hunting Across Data Sources, AI-Driven UEBA

CrowdStrike is launching new innovations to power the AI-native security operations center (SOC) and help teams hunt and resolve threats with speed and accuracy. A new solution, CrowdStrike Falcon Adversary OverWatch Next-Gen SIEM, will bring managed threat hunting to available third-party data and extend the visibility of CrowdStrike’s elite threat hunters into unmanaged attack surfaces.

CrowdStrike Launches Agentic AI Innovations to Fortify the AI-Native SOC

The pace and prevalence of adversarial AI is only accelerating — and organizations must harness the power of AI to stop them. CrowdStrike is building the tools they need to do it. Our latest innovations include Charlotte AI Agentic Workflows, Charlotte AI Agentic Response, and CrowdStrike Falcon Complete Next-Gen MDR now using CrowdStrike Charlotte AI. We are also announcing platform-level AI advancements that prioritize risk and aid in response.

Feroot Launches AlphaPrivacy AI: Automating Global Privacy Compliance for Websites and Web Applications

AlphaPrivacy AI platform ensures compliance with GDPR, CCPA, HIPAA, and more, reducing compliance costs by up to 99.9% TORONTO, ONTARIO, CANADA, April 28, 2025 – Feroot Security, a leader in web application security and compliance, today announced the launch of AlphaPrivacy AI, an AI-powered platform designed to automate privacy compliance for enterprise websites and web applications.

Cipher, Your New GenAI Security Assistant, Helps Your Team Act Faster and with Greater Confidence

The best security outcomes come from the intersection of security expertise and the ability to act based on risk levels. At Arctic Wolf, we are laser focused on security outcomes for the security leaders and teams across our solutions — Arctic Wolf Managed Detection and Response (MDR), Aurora Endpoint Security, Arctic Wolf Managed Risk, Arctic Wolf Managed Security Awareness , Arctic Wolf Incident Response, as well as risk transfer with the Arctic Wolf Security Operations Warranty.

Mastering AI Adoption with End-to-end Security, Everywhere

The pace of innovation in generative AI has been nothing short of explosive. What began with users experimenting with public apps like ChatGPT has rapidly evolved into widespread enterprise adoption. AI features are now seamlessly embedded into everyday business tools, such as customer service platforms like Gladly, HR software like Lattice, and even social media networks like LinkedIn.

Modernizing Cyber Risk Registers: From Spreadsheets to SaaS Solutions

‍In the early days of cyber risk management, during which the responsibilities of a security and risk manager (SRM) were relatively siloed and limited in scope, leveraging a spreadsheet to maintain a cybersecurity risk register was a practical and widely accepted solution. At that time, the volume and complexity of cyber risks were much more manageable than they are today, making spreadsheets a convenient way to catalog them, prioritize mitigation activities, and track progress.

What's new in Riscosity: April 2025

Here at Riscosity, our team is keenly aware of the ongoing rise of AI adoption that is taking the world by the storm. As a company whose mission is to help organizations gain control over their 3rd party data flows, it is only logical that our capabilities support AI as well. What better time than RSA to announce the latest AI-related innovation that Riscosity has released!

The end of muckwork

Muckwork is the invisible drag on every company. It’s the repetitive, manual, low-leverage work we tolerate because we assume it’s necessary. Copying data between systems. Triaging alerts. Clicking through approvals. Tasks that keep things running but slow everything down. In 2006, Jeff Bezos called the backend plumbing of web apps “muck.” AWS was created to eliminate it. Today, the same kind of work is everywhere in the enterprise. We call it muckwork.

Asset Discovery: A Starting Point, Not a Security Strategy

One of the foundational security practitioners’ mantra “you can’t protect what you can’t see” has become a security gospel. As enterprises expanded from hundreds of physical assets to thousands of devices including ephemeral workloads, a troubling reality has emerged: visibility alone does not equal security. In this article.