Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Secure your secrets at runtime with the 1Password CLI and Environments

Stop storing secrets in.env files. In this video, we show you how to use 1Password Environments to securely inject environment variables at runtime without storing plaintext on disk. You'll see how the same 1Password Environment powers: 1Password Environments provide secure, read-only access to environment variables across development and production workflows. Key benefits: No plaintext secrets on disk Least-privilege access controls Secure runtime injection Works with CLI, SDKs, and service accounts Reliable automation across macOS and Linux.

Vulnerability Remediation: From Scan Results to Real Fixes

Vulnerability scanning is useless if you don’t fix what you find. This short breaks down a practical vulnerability remediation process to prioritize risk, patch faster, and reduce real-world exposure. Learn how security teams move from detection to closure, without months of backlog.

How AI is Reshaping Cyber Threats

In Episode of Guardians of the Enterprise, Ashish Tandon, Founder & CEO, Indusface, spoke with Madhur Joshi, CISO at HDB Financial Services (part of the HDFC Group), about how AI is reshaping the cyber threat landscape. They discussed how attackers are now leveraging AI to launch more sophisticated phishing campaigns, automate malware, and scale attacks faster than ever before. As AI lowers the barrier to entry, the speed and complexity of attacks continue to increase, making it harder for organizations to keep up.

Permission to Ignore: Leveraging the CTEM Framework to Focus on Real Risk

Security frameworks have always had a gap. They tell you to find vulnerabilities and fix them, but they’ve rarely provided a system to determine which ones actually matter before you tap into your most expensive resource: engineering time. CTEM changes the game by treating security as a continuous lifecycle rather than a series of silos.

1,500% Surge in New Malware: Why MSPs Must Act Now

The latest findings from WatchGuard Technologies reveal a stark reality for managed service providers: cyber threats are not only increasing—they’re evolving faster than traditional defenses can keep up. In its newest Internet Security Report, WatchGuard identified a 1,548% spike in new, unique malware from Q3 to Q4 2025. Nearly one in four threats bypassed signature-based detection, highlighting a critical gap in reactive security models still used across many customer environments.

From Data to Action: Key Insights About Advancing Security Practices

The cybersecurity landscape is in constant flux, shaped by emerging technologies, evolving threats, and increasing regulatory demands. As organisations strive to protect their digital ecosystems, the challenge isn’t just collecting data—it’s turning that data into actionable strategies that drive meaningful change. Next week, we’ll unveil the 16th edition of Veracode’s flagship State of Software Security (SoSS) report—a cornerstone of the cybersecurity calendar.

Report: AI-Driven Fraud Surged by 1200% in December 2025

AI-driven fraud attacks spiked by more than 1200% in December 2025, according to a new report by Pindrop Security. Threat actors are using AI to assist in every stage of the attack, from deploying bots to conduct reconnaissance to using deepfakes to trick humans. “According to Pindrop internal data, AI fraud (or non-live fraud) surged 1210% by December 2025,” the researchers write.

AI-Assisted Social Engineering Attacks Continue to Rise

Social engineering remained the top initial access vector for cyberattacks in 2025, with increasing assistance from AI tools, according to a report from ThreatDown. The researchers warn that AI will likely become a core component of social engineering attacks throughout 2026. “Deepfake voice, image, and video impersonation now requires minimal expertise and only a handful of reference images or seconds of audio,” the researchers write.

Sovereign Clouds Need Open Data Protection. Here Is Why.

Digital sovereignty is not a talking point anymore. It is a real technical requirement. Governments, telcos, and regulated enterprises are building sovereign clouds on OpenStack to keep data under their jurisdiction. But what about the backups? If your sovereign cloud data protection solution uses a proprietary format, you have traded one lock-in for another.