Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Zero Trust Access. Simplified.

Secure access is broken. Hybrid work, unmanaged devices, and cloud apps have outgrown VPNs, leaving gaps in security and increasing operational complexity. This video shows how Cato Universal ZTNA replaces fragmented access with a single, consistent policy across all users, devices, and applications while improving performance and control. You’ll see how continuous, risk-based access and application-level connectivity can reduce exposure while simplifying operations.

CloudCasa Launches in the NKP Partner Catalog, Expanding Data Protection and Mobility for NKP Users

At Nutanix.NEXT, we’re excited to announce that CloudCasa is launching in the NKP Partner Catalog, giving Nutanix Kubernetes Platform (NKP) solution users an easier way to add Kubernetes-native backup, recovery, disaster recovery, and migration to their environments. This launch builds on CloudCasa’s existing Nutanix Ready foundation and extends that value even further by making CloudCasa available through the NKP Partner Catalog.

Your AppSec Metrics Are Lying to You. Here's What Actually Matters

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

What is Endpoint Management? Complete Guide for IT Admins

Most organizations don’t struggle with managing devices in the beginning. A few laptops, some smartphones and tablets, everything feels under control. The problem starts when things scale. More devices get added. Teams start working remotely. Different operating systems and use cases come into play. Over time, it becomes harder to track what’s connected, what’s updated, and what’s secure. That’s when endpoint management stops being optional.

How Weak AI Governance Is Creating A Security Disaster #cybersecurity #aisecurity

This episode explores why CTEM matters in a world of vibe coding, AI agents and rapidly expanding attack surfaces. It covers prompt injection, hidden threats, deepfakes, weak governance and the growing fear that businesses are deploying AI far faster than security teams can understand or control it.

You Can't Patch Your Supply Chain So Why Treat It Like a Vulnerability Problem?

For years, vulnerability management has followed a familiar pattern: discover assets, scan for CVEs, prioritize by severity, and remediate what you can. That model works, at least within the boundaries of systems you own. The problem is that most organizations no longer operate within those boundaries. Federal agencies especially depend on a complex ecosystem of SaaS platforms, software vendors, contractors, and open-source components.

What is the NIST AI Risk Management Framework?

The NIST AI Risk Management Framework is a guide that helps organizations spot and reduce risks in AI systems. This framework was released in January 2023 by the U.S. National Institute of Standards and Technology. The framework is built around four key steps, namely: Govern, Map, Measure, and Manage, and is meant to help teams responsibly use AI. It doesn’t matter which industry you work in or which AI you use; this framework works everywhere.

Introducing the Datadog Code Security MCP

AI-assisted development helps teams write code faster, but that speed comes with added security risk. As agents generate more code, they can introduce vulnerabilities, insecure dependencies, or exposed secrets, often before a human reviewer ever sees the change. Security teams are left reviewing more code with the same resources, which makes it harder to catch issues early.

Container Security Without Context Is Just More Noise

Mend.io’s new Docker Hardened Images integration brings DHI intelligence directly into the AppSec workflow, giving a smarter, faster path to container security. Container scanning has a noise problem. Run a standard scan against any production image, and you’ll surface thousands of CVEs.

The Ingestion Cost Problem the SOC Can No Longer Ignore

Security teams are collecting more telemetry across endpoints, cloud workloads, and SaaS platforms, but the cost of bringing that data into the SIEM keeps rising. What used to be a straightforward operational decision has become a central budget challenge. Security teams are not struggling with collecting data, they are struggling with affording to keep it, and when ingestion cost drives visibility decisions, the SOC loses ground.