Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

10 steps to trusted, validated autonomous IT

Because IT security no longer moves at human speed, endpoint management can no longer be seen as a background IT function. It’s now the front line and critical as ever. Attackers move fast, and AI makes them faster. Organizations can’t keep validating exposure and fixing issues the old way. Endpoint management has to run at machine speed because every manual handoff and every delayed exception adds more risk.

Mini Shai-Hulud supply chain attack: Why this campaign changes how defenders should think about trusted software

The Mini Shai-Hulud supply chain attack compromised more than 170 packages across npm and PyPI, including packages from TanStack, Mistral AI, and Guardrails AI, by hijacking legitimate CI/CD publishing workflows to distribute malicious versions that still carried apparently valid provenance signals.

What are runbooks? And how to automate them

Runbooks are supposed to be the safety net under operations. Unfortunately, most aren't because they live in wikis that decay as tools change, get linked from alerts but never consulted, and fail the responder the moment pressure arrives. The gap is between what the runbook says and what the responder can actually execute. Teams reach for AI to close the gap.

Shadow IT vs Shadow AI: What's the Difference?

Imagine a customer service representative at your organization uploads sensitive customer data into an AI tool to draft emails more quickly. When an employee uses an AI tool without IT approval, it is known as shadow AI, and such scenarios are becoming increasingly common. Among employees who use AI at work, 78% report using tools that have not been formally approved by their organization, according to Microsoft’s 2024 Work Trend Index.

The GitGuardian Secret Detection Engine Just Got 43X Faster Thanks To Rust

While not a new feature, the GitGuardian team has been hard at work making updates to our TokenScanner, the underlying engine that powers GitGuardian's secret scanning ability. This is great news for folks dealing with very large repos and legacy platforms that thousands of developers have touched over the years. Scanning millions of files, attachments, commits, and anywhere else secrets might be hiding takes minutes. Historical scans across petabytes of information, which used to take days, now take less than an hour. What used to take hours takes a few short minutes.

Does the rise of AI mean human-led SOCs are obsolete? With Dr. Adeel Shaikh Muhammad [322]

Dr. Adeel Shaikh Muhammad, a cybersecurity strategist and global speaker with over 16 years of experience across information security, networks, and systems. Adeel brings a practical perspective on how organizations can adapt to evolving cyber threats and the growing role of AI in cybersecurity.