Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

New Research Exposes Critical Gap: 64% of Third-Party Applications Access Sensitive Data Without Authorization

Reflectiz today announced the release of its 2026 State of Web Exposure Research, revealing a sharp escalation in clientside risk across global websites, driven primarily by thirdparty applications, marketing tools, and unmanaged digital integrations. According to the new analysis of 4,700 leading websites, 64% of thirdparty applications now access sensitive data without legitimate business justification, up from 51% last year - a 25% yearoveryear spike highlighting a widening governance gap.

LevelBlue Threat Trends Report | Looking Back at the Key Findings Shaping Today's Security Landscape

Originally recorded in 2025, we look back at the key threat trends and attack techniques shaping the security landscape at the time. Now available as an archive recording, the session explores emerging threats, evolving attacker tactics, and early indicators of risks that still influence cybersecurity strategies today. While the data reflects 2025, many of the insights remain relevant for understanding how the modern threat landscape has evolved.

Cyberhaven Product Launch: Uniting DSPM & DLP to Secure Data in the AI Era

AI is rewriting data risk. On Feb 3, see how to fight back. Every week, AI makes your team faster—and your data more exposed. Files jump between new tools, models train on sensitive inputs, and traditional DLP is blind to the context that matters most. On February 3 at 11:00 AM PST, we’re pulling back the curtain on Cyberhaven’s unified DSPM & DLP platform—and showing how a single, AI‑native platform can finally keep up with how data actually moves.

11 Best Identity and Access Management (IAM) Tools in 2026

As organizations scale across cloud, hybrid, and remote-first environments, identity has become the most critical security layer. Traditional perimeter-based security models are no longer effective against modern threats such as credential theft, phishing attacks, insider risks, and unauthorized access to SaaS applications. This shift has made Identity and Access Management (IAM) a foundational requirement for enterprises of all sizes.

Certificate permissions with CertKit Applications

When you’re managing a handful of certificates, one big list works fine. Add a few dozen more and things get messy. Add multiple teams or projects and you’ve got a problem. Who should have access to the production certificates? What about staging? Does the contractor working on the marketing site really need to see your internal infrastructure? CertKit now supports multiple applications from our roadmap to help you sort this out.

How to Hide Prices on Shopify

Pricing transparency works well for many direct-to-consumer stores, but for a growing number of Shopify merchants, especially those operating B2B, wholesale, or inclusive business models, displaying prices publicly can create more friction than value. This is where the need to hide prices on Shopify becomes a strategic and operational decision rather than just a cosmetic one. Shopify does not provide a native setting to control price visibility.