Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Your Data Loss Prevention Tool Misses Every Single Day

In this video, you will learn why legacy DLP tools go blind when sensitive data is copy-pasted into generative AI tools, how Data Lineage fingerprints information at its origin to track it across transformation within an environment, and how operating system-level monitoring eliminates the encryption blindness that limits browsers and firewalls. You will also see how to build context-aware paste policies that allow productive AI use while blocking high-risk data flows from sources like source code repositories, Salesforce, and internal wikis.

Claude Mythos Is Not the Problem. Your Security Basics Are

There is a lot of panic around Claude Mythos. Some people are saying it will hack every system, that the sky is falling, and that there is no stopping it. That fear is dangerous because it makes teams freeze. Claude Mythos is genuinely powerful. AI systems like this can find security issues in minutes that even experienced penetration testers might take weeks to identify and exploit. That part is real. But here is the important point: AI is still exploiting what is already there.

Why WatchGuard Acquired Perimeters.io: Making Cloud Security Work for MSPs

If you ask any MSP what they use to protect their clients’ cloud environments, you will get one of two answers. Either they’ll point to the native security tools built into platforms like Microsoft 365 or Google Workspace. Or they’ll describe a patchwork of different products stitched together to cover identity, configuration, and SaaS visibility. Neither approach is ideal. But both reflect the reality MSPs are working with today.

Meet Rai: AI That Runs More of the Security Work

MSPs are managing more customers, more environments, and more tools than ever before. At the same time, customer expectations keep rising -- faster response times, clearer reporting, and consistent service across every client. All of that pressure lands on already‑lean teams. That’s the reality Rai was built for.

Why security makes or breaks M&As, with Matt O'Leary

Security is tied to business operations in many (often unappreciated) ways, but the connection is rarely more visible or consequential than during an acquisition or partnership. In those deals, a company stakes its reputation and finances on another company, and a lapse in security can throw the whole thing into chaos.

AI GitHub Agents: How One Issue Leaked Private Repos

In May 2025, a developer using Claude with the GitHub MCP server asked their AI assistant to do something entirely routine: review the open issues in a public repository. The repository contained a malicious GitHub issue planted by a researcher demonstrating a security vulnerability. The issue contained hidden instructions. The AI read them, followed them, accessed the developer's private repositories, and posted the contents in a publicly visible pull request. No credentials were stolen.

How to Detect Account Takeover in Real-Time: Moving Beyond Login Alerts

Most enterprise fraud stacks are built to detect account takeover after it’s already succeeded. Login anomaly rules fire at authentication. Transaction models fire at monetization. By both points, the attacker is already inside. Knowing how to detect account takeover in real-time means shifting detection upstream – to behavioral signals, device trust, credential exposure feeds, and session integrity monitoring that activate before any fraudulent transaction is attempted.

How leadership should assess DevOps backup solutions before purchase

Managing a growing list of vendors can add complexity across an organization. Adding a new partner may require navigating additional administrative processes and internal alignment. As a result, third-party DevOps backup often ends up lower on the priority list until one serious data deletion, prolonged recovery, or failed restore turns it from a “nice to have” into an executive-level decision.

The Exploitability Intelligence Gap: What Security Teams Can Know Before CISA KEV

In this webinar, Nucleus Security CEO Steve Carter and Product Marketing Lead Tally Netzer break down the growing “exploitability intelligence gap” and what it means for modern vulnerability and exposure management programs. Drawing from six months of research and real-world vulnerability data, they explore how attacker timelines have compressed, why traditional reactive workflows are struggling to keep pace, and where organizations are missing critical signals before exploitation begins.

Ep. 57 - Russia's Proxy Bridge: BlackCat, Scattered Spider, and the Kremlin

In Part 4 of our Russian intelligence series, host Tova Dvorin and Adrian Culley map the proxy bridge between Western teenage hackers and Moscow. BlackCat (ALPHV) ransomware-as-a-service is the operational hinge: Scattered Spider breaks in, BlackCat encrypts, and the FSB watches the dashboard. Hear how the Kremlin earns plausible deniability, why a $115M extortion stream self-funds Russian intelligence, and what MI6's new "hybrid shadow war" warning means for defenders simulating Rust-based ransomware in their own networks.