Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Howler Episode 20: Matt Bykowski, SVP Global Acquisition Sales

This month, we sit down with Matt Bykowski, Senior Vice President of Global Acquisition Sales, as he shares how he works to enable & empower his team, learnings from leading an increasingly global team, his thoughts on the transition from high performer to people leader, and so much more! Matt Bykowski is a dynamic sales leader with over 15 years of experience driving growth in the technology sector.

Best AI Red Teaming Services: Top 6 Platforms and Services in 2025

AI red teaming services involve security assessments focused on artificial intelligence systems. Unlike traditional red teaming, which targets general IT infrastructure, AI red teaming targets the unique attack surfaces and risks associated with AI, large language models (LLMs), and machine learning deployments. These services simulate adversarial attacks, probing for vulnerabilities like prompt injection, data leakage, bias, and malicious manipulation.

Enhancing Endpoint Visibility Through a Unified Security Approach

It’s easy to miss critical signs when endpoint tools work in isolation. When a laptop shows unusual behavior but its network or cloud interactions are invisible, early compromise can go undetected. By bringing together endpoint detection and response (EDR), network telemetry, and cloud context under a unified security approach, teams gain the full picture needed to spot threats quickly.

DIST Cyber Security Sectoral Analysis 2025 - A roadmap for navigating cybersecurity in the UK

The DIST Cyber Security Sectoral Analysis 2025 provides valuable insight and advice for navigating cybersecurity threats in the UK. It emphasises that the cybersecurity industry must innovate and adapt continually to address new and emerging technologies, along with wide range of complex cybersecurity threats. The latest sectoral analyses highlighted that cybersecurity is a booming and dynamic industry in the UK, and it thrives on innovation, regulatory evolution and strategic collaboration.

What CISA's BOD 25-01 Means for API Security and How Wallarm Can Help

The US government has taken another significant step towards strengthening cloud security with the release of CISA’s Binding Operational Directive (BOD) 25-01. Aimed at improving the security posture of federal cloud environments, BOD 25-01 mandates robust configuration, visibility, and control across cloud-based services. While the directive doesn’t explicitly name API security, securing modern cloud systems relies on securing APIs - including the ones security teams don’t know about.

Empowering your LLMs: Unlocking cybersecurity queries with Open WebUI knowledge bases

In the rapidly evolving landscape of large language models (LLMs), the ability to access and synthesize vast amounts of information is paramount. While LLMs excel at generating creative text and understanding complex prompts, their knowledge is often limited to the data used during their training. This is where knowledge bases (a.k.a.

The quantum-AI collision: What CISOs must do now to stay ahead

Technology is moving at the speed of light, and two forces—quantum computing and AI agents—are poised to shake up cybersecurity. We’re not talking about some far-off future; this is happening now. The message for CISOs and security leaders is simple: If you’re not preparing now, you’re already behind. As we say in Brazil, “Melhor prevenir do que remediar” or “better to prevent than remediate.”