Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Is Your API Security Just "Good Enough"? Why That's Not Enough Anymore

APIs serve as the foundation for modern digital innovation, supporting everything from mobile applications to intricate business integrations. However, as their numbers soar, with many companies experiencing annual growth rates of 50-100%, they have also become a significant target for cyber attackers. Relying on "good enough" API security could leave your most vital assets perilously unprotected.

Understanding the U.S. Cloud Act: Impact on Compliance, Agreement, and Data Protection

The complex nature of the U.S. CLOUD Act (CLOUD Act) presents far-reaching implications for global data governance. In this article, we explore how this pivotal legislation is reshaping compliance requirements, transforming privacy frameworks and challenging traditional concepts of data sovereignty, as well as strategies and technologies to ensure compliance.

Securing the future of AI Agents: Reflections from the Microsoft Build Stage

Standing on stage at Microsoft Build, surrounded by innovators shaping the future in the era of AI Agents, I felt equal parts inspired and responsible. Inspired by the rapid momentum around AI, and responsible for raising a flag about something we don’t talk about enough - how we secure the very systems that are now acting on our behalf. This post isn’t a recap, rather a continuation, a chance to go deeper into the story I shared (and the one we’re still writing.)

Effective Detection Methods Against Common Insider Threat Techniques

With remote work, hybrid IT environments, and AI-enhanced automation on the rise, insider threats remain among the most damaging and difficult-to-detect risks in cybersecurity. Identifying malicious insider activity may take weeks or even months despite the many efforts companies put into building cybersecurity threat detection systems. You can increase your chances of uncovering malicious activity by studying insider threat techniques and applying diverse detection methods.

EP 8 - Zero Trust, Zero Chill: Securing Machine Identity

In this episode of Security Matters, host David Puner welcomes Kevin Bocek, CyberArk SVP of Innovation, for an insightful discussion on the critical role of machine identity in modern cybersecurity. As digital environments become increasingly complex, securing machine identities has never been more crucial.

Tanium Patching for Linux - Lite Touch & Automate - Tanium Tech Talks #128-2

In this series we look at how Tanium makes Linux patching easier with a consistent workflow and reporting across both and by using a single tool. We will cover three methods:Zero Touch - deploy the latest patches automaticallyLite Touch - lock in a change control date for patching and dependency consistencyAutomate - similar to lite touch with the added benefits of pre/post patching activity and timed phases of deployment with reliability gates.

Tanium Patching for Linux - Zero Touch - Tanium Tech Talks #128-1

In this series we look at how Tanium makes Linux patching easier with a consistent workflow and reporting across both and by using a single tool. We will cover three methods:Zero Touch - deploy the latest patches automaticallyLite Touch - lock in a change control date for patching and dependency consistencyAutomate - similar to lite touch with the added benefits of pre/post patching activity and timed phases of deployment with reliability gates.