Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What We Found with OpenAI's Codex CLI Tool

In this video, I explore OpenAI’s Codex CLI tool to see how powerful it really is for coding with AI. But things quickly go off the rails… what started as a simple test ended with a surprise identity verification request. Apparently, to continue using the tool, I need to submit a government-issued ID and a photo of myself—something I didn’t expect at all. I talk through the process, show the error I ran into, and share my honest thoughts on this level of access and how invasive it feels for a developer tool.

How Keeper Protects Non-Human Identities (NHIs) in IT Environments

As infrastructure becomes more automated and distributed, the number of Non-Human Identities (NHIs) within enterprise environments has quietly surpassed that of human users. These NHIs now play a foundational role in everything from DevOps pipelines to AI-powered workflows, often relying on secrets like API keys, certificates and tokens to access systems and perform critical tasks. While NHIs are doing more, they’re being secured less.

Fixing 4,000 Vulnerabilities? Quick Ways to Eliminate Security Issues! #podcast #infosec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Ransomware Detection and Response: Strengthening Your Cyber Resilience

In 2024, the average ransom payment surged to nearly $4 million, more than double the previous year, while over 70% of ransomware incidents involved data encryption (Source: The Latest Ransomware Statistics & Trends ). These figures underscore the growing scale and sophistication of ransomware threats. As attackers refine their tactics and target critical infrastructure, organizations must adopt a more strategic and proactive approach to detection and response.

110 security and compliance statistics for tech leaders to know in 2025

Staying compliant has never been more complex or more critical. With evolving regulations, expanding tech stacks, and increasing third-party exposure, today’s security and compliance teams are under constant pressure to reduce risk while upholding trust. Understanding the latest trends is key to staying ahead. ‍ This roundup of security and compliance statistics brings together the most up-to-date data on regulatory readiness, breach impact, automation, vendor risk, and more.

The Power of Scheduled Automated Backups for DevOps and SaaS

In 2020, a DevOps team at a mid-sized fintech startup almost lost its entire source code. A failed container update caused a cascading failure in their self-hosted GitLab instance. The backup was… somewhere. No one checked it in weeks. The recovery process took three days. The cost was around $70,000 in downtime and customer compensation. The event wasn’t a matter of not having a backup strategy. It was a matter of assuming someone, somewhere, had run the proper function at the right time.

What is JSON Web Token (JWT)? Structure, Features, Authentication & Best Practices

In a world of digital security and authentication, JSON Web Tokens (JWTs) have risen as a secure and lightweight way to transmit user information between services. JWTs are used for everything from single sign-on to API authorization, and they play a key role in modern web development. This article will answer the questions of what JWTs are, how they work, and how to use them securely, while referencing five leading articles on the topic.

Cisco Network Visibility Module Analytics (NVM)

Cisco Network Visibility Module Analytics (NVM): A new analytic story leveraging Cisco NVM telemetry to detect suspicious endpoint network behavior. This release includes 14 new analytics and mapped existing detections covering threats such as insecure curl usage, typosquatted Python packages, abuse of native Windows tools like rundll32 and mshta, and anomalous network connections from uncommon or argument-less processes.

Lionishackers: Analyzing a corporate database seller

Outpost24’s threat intelligence researchers have been analyzing a corporate database seller known as “Lionishackers”. They’re a financially motivated threat actor focused on exfiltrating and selling corporate databases. This post explores how they operate, where their attacks are taking place, and the current level of threat they pose.

ZTNA Alone Won't Win the Zero Trust Race. Here's Why.

In the race to secure modern enterprises, Zero Trust Network Access (ZTNA) is gaining speed, and has become the default remote access solution for many enterprises. But while ZTNA is a fabulous on-ramp to Zero Trust and a broader security strategy, it’s not enough to secure the win on its own. Operationalizing Zero Trust requires takes than just access control. It requires a security platform play: convergence, continuous risk evaluation, and visibility across every edge.