Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cyber Startup Frenetik Launches with Patented Deception Technology That Bets Against the AI Arms Race

While most cybersecurity companies pour resources into AI models, massive compute, hoovering up all the data, and enhanced analytics to detect and prevent threats, Frenetik, a Maryland cyber startup, is betting on something simpler: making sure attackers don't know what defenders know. The company emerged today with a fundamentally different approach using novel cyber deception and a newly issued U.S. patent to back it.

Reach Security Joins the Microsoft for Startups Pegasus Program to Accelerate Agentic AI for E3/E5 Security Optimization

Reach Security announces its acceptance into the Microsoft for Startups Pegasus Program. Through the Pegasus Program, Reach will collaborate with Microsoft to help enterprise customers optimize their use of Microsoft E3 and E5 security suites by addressing configuration, visibility, and operational gaps through agentic AI.

WatchGuard Threat Lab's top six cybersecurity predictions for 2026

WatchGuard has revealed its top six cybersecurity predictions for 2026, forecasting a year where AI-driven threats, regulatory pressures, and the decline of legacy tools will reshape the security landscape. Corey Nachreiner, chief security officer at WatchGuard Technologies, emphasises that organisations must prepare for rapid evolution in both attack methods and defensive strategies.

Defining and Defending Against a Zero Day Attack

Unexpected attacks are the hardest to fend off. In the realm of cyber, Zero Day vulnerabilities are among the greatest risks, as these software flaws are unknown and exploited before a fix is available, potentially compromising the thousands of organizations that are unwittingly using vulnerable software.

Ep 21: How to start a threat program

In this Masters of Data episode, we welcome back Chas Clawson to discuss building effective threat hunting programs from the ground up. We explore the difference between proactive threat hunting and detection engineering, emphasizing how AI tools are making sophisticated security operations accessible to teams of any size. We cover practical approaches, such as prioritizing threats based on business risk, creating feedback loops between red and blue teams, and measuring success through meaningful metrics rather than vanity numbers.

Why Account Takeover Is a CX Problem, Not Just a Security One

Account takeover is usually and unsurprisingly approached as a security incident, yet much of the customer impact begins earlier in the journey, long before security teams detect or analyse the event. When users face friction, lockouts, or unexpected changes to their accounts, trust starts to erode. This makes the account takeover impact on customer experience a major determinant of brand trust and loyalty.

What is VoIP and How Does it Work?

Your phone rings. The number looks local, even familiar - so you answer. But within seconds, you're being asked to “verify your bank account” or “reset your login credentials.” Sounds suspicious? It is. That call likely came from a VoIP number, which is not a regular phone line. VoIP (Voice over Internet Protocol) lets anyone make calls over the internet, not just through mobile networks or landlines.

How Generative AI is Changing the DLP Landscape

Generative AI has revolutionized productivity, but it has also introduced a new class of data risk that legacy DLP tools simply can’t see. From engineers pasting source code into ChatGPT to marketers rewriting strategy docs, sensitive IP is leaving the browser through "Shadow AI" channels daily. Learn why traditional pattern matching fails against LLMs and how a data lineage approach secures AI usage without halting innovation.

Mend.io + Wiz: A New Code-to-Cloud Integration for Accurate, Context-Driven Risk Prioritization

Today, we’re excited to announce the availability of Mend.io’s new integration with Wiz, delivering a powerful Code-to-Cloud security workflow for joint customers. By bringing Mend SAST’s high-accuracy code findings directly into the Wiz platform, organizations can now unify code-level risks with cloud posture, runtime context, identities, and infrastructure—unlocking the complete picture needed to prioritize and remediate risk with confidence.