Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top Cybersecurity Tools for Small and Medium Businesses (SMBs)

Cybercriminals frequently target Small and Medium-sized Businesses (SMBs) due to their limited security resources. As cyber attacks become more sophisticated, SMBs must proactively defend their critical systems and sensitive data by investing in the right cybersecurity tools. Some cybersecurity tools that every SMB should consider adding to their security stack include a password manager, a Privileged Access Management (PAM) solution, a secure remote access solution and a secrets manager.

Widespread Salesforce Data Theft via Compromised Salesloft Drift OAuth Tokens

On August 20, 2025, Salesloft published an advisory describing a security issue potentially affecting the Salesloft Drift integration with Salesforce. On August 26, Google Threat Intelligence Group (GTIG) provided additional details about the campaign, in which a threat actor known as UNC6395 authenticated against Salesforce customer instances using compromised OAuth tokens tied to the Salesloft Drift integration with Salesforce.

The Role of AI in Endpoint Security

One can’t discuss the modern state of endpoint security without mentioning a term that has quickly become ubiquitous with security solutions: artificial intelligence (AI). With a constantly evolving threat landscape and many security challenges plaguing organizations (e.g sprawling attack surfaces, monitoring and continuity gaps, alert overload, and limited resources), it’s clear that endpoint security must evolve as well, and the most-promising advancement is AI.

GitGuardian MCP Sever - Example Use Cases and Installation

In this video, learn how to set up and use GitGuardian’s new MCP (Model Context Protocol) server to bring secrets security and Non-Human Identity (NHI) governance directly into your AI-powered IDE, like Cursor or Claude Desktop. GitGuardian Developer Advocate Dwayne McDaniel shows how to install the MCP server and run real use cases—like scanning for secrets, listing incidents, and creating honeytokens—all from inside your coding environment. Ready to embed security where code is written?

China's Cyber Strategy Exposed

Chinese cyber operations aren’t random hacks; they are part of a broader geopolitical competition for information, economic advantage, and strategic influence. Every operation ties back to China’s long-term national objectives. Mei Danowski, Co-Founder of Natto Thoughts Online Publication, explains how these attacks serve national objectives and why cybersecurity defenders must adapt.

Why Protecto Chose SingleStore as Part of GPTGuard's Architecture

Traditional RAG creates risk. In enterprise AI, accuracy and security aren’t optional. Most vector-only databases are built for speed, but they ignore enterprise realities like security and compliance. Without context, access controls, or accurate recall, they create compliance gaps that make AI unsafe for regulated industries. At Protecto, we built GPTGuard to change that — making enterprise AI safe by preventing data leaks, enforcing privacy, and keeping compliance intact.