Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Featured Post

Machines, the Silent Threat Lurking Inside the Enterprise

The digital enterprise is no longer primarily made up of individuals' identities. According to Gartner, over 60% of all identities in a typical organization are non-human. These Non-Human Identities (NHIs) are digital identities assigned to software, services, applications, containers, or devices that require access to systems and data. Unlike human identities, NHIs operate autonomously, at scale, and often with high privilege. This makes them essential for modern automation and uniquely vulnerable to misuse.

Link11 Reports 225% more DDoS attacks in H1 2025 with new tactics against infrastructure

The threat landscape surrounding distributed denial-of-service (DDoS) attacks intensified significantly in the first half of 2025, according to the latest Link11 European Cyber Report. Documented attacks targeting the Link11 network increased by 225% compared to the same period in 2024. The report highlights not only a marked rise in attack frequency but also a substantial escalation in their duration, intensity, and technical sophistication.

Vanta Delivers: New AI-powered Capabilities to Help Security Teams Move Beyond Reactive Risk

AI-powered workflows and Vanta AI Agent extend to policy management, enterprise risk oversight, vendor monitoring, and Slack collaboration. Product announcements and demos debut at Vanta Delivers: AI-Powered Risk Management virtual event September 10.

Egnyte Unveils AI Agents to Boost Efficiency and Reduce Risk for the Architecture, Engineering, and Construction Industry

Egnyte announces its first industry-specific AI agents specifically designed to support the unique needs of the Architecture, Engineering, and Construction (AEC) industry. These AEC AI agents target some of the most time-consuming and costly parts of the process, from bid to completion, by addressing some of the most labor-intensive tasks involving often very complex documents.

What Every CISO Should Know About How DLP Actually Works

For most CISOs, data loss prevention (DLP) has long been a familiar acronym. It’s a category of security technology that has been around for more than a decade, often associated with compliance and the need to keep regulated data under control. Yet while the concept sounds straightforward—preventing sensitive data from leaving the organization—the reality is that modern DLP platforms are far more sophisticated than their early predecessors.

From Black Hat to Boardrooms: Making Sense of the SASE Market Shift

Dave McGrail and Jaye Tillson cut through the noise on the biggest shifts in security right now. From Black Hat insights to Palo Alto’s CyberArk acquisition, they discuss what it all means for SASE, Zero Trust and the growing importance of identity. Plus, why VPN replacement is more than just a tech swap — and how choosing the right partner makes or breaks SASE transformation.

Strengthen SOC Defenses with Native UEBA in Splunk Enterprise Security

At.conf25, we announced how Splunk Enterprise Security (ES) has transformed to today’s AI-powered SecOps platform—unifying industry-leading technologies across SIEM, SOAR, User and Entity Behavior Analytics (UEBA), threat intelligence, and detection engineering with purpose-built AI across the entire Threat Detection, Investigation, and Response (TDIR) workflow—empowering Security Operations Centers (SOCs) to end analyst fatigue, deliver faster security outcomes, reduce risk, and build r