Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Transforming AI Risk Awareness Into Measurable AI Governance

Only a few years ago, after more than a decade of debate over how cybersecurity incidents affect the financial stability of public companies, the U.S. Securities and Exchange Commission (SEC) finally made cyber risk disclosure a formal requirement. The intent was to bring transparency and accountability to a category of risk that had long been treated as technical rather than financial. Now, albeit voluntarily, AI has entered that same conversation, but the speed of its arrival has been remarkable.

How AWS WorkSpaces & Teramind Enhance Workforce Intelligence

Teramind, an ISV Accelerate AWS Partner, delivers a crucial layer of visibility, security, and productivity management that highly complements the Amazon WorkSpaces Family services. This partnership ensures customers move beyond the architectural security and agility provided by AWS to gain granular control over user behavior, insider risk, and operational efficiency within their virtual desktop infrastructure (VDI).

The role of credentials in the AI espionage campaign reported by Anthropic

Anthropic recently announced that the company has disrupted the first reported AI-orchestrated cyber espionage campaign. This attack used Claude Code to automate many steps, with AI handling up to 90% of the tasks, including web searches and the autonomous writing of exploit code. The attackers bypassed Claude’s guardrails by breaking each step into small tasks and role-playing as a red team member.

The CISO's Al Dilemma: How Security Leaders Are Making or Breaking Their Company's Future

AI agents are transforming how leading companies operate, delivering 24/7 customer service, processing thousands of transactions, and driving unprecedented operational efficiency. 53% of organizations are already deploying AI agents for customer-facing tasks, with market leaders running hundreds or thousands of agents to gain a competitive advantage. These agents handle sensitive data, trigger transactions, and make autonomous decisions at machine speed. But the APIs that power them are becoming a vast, overlooked attack surface.

Identify Unknown or Unapproved Devices: How Forward Networks Helps Strengthen Supply-Chain and Zero Trust Compliance

Modern enterprise and federal networks increasingly face challenges related to identifying and validating the hardware operating within their environments. While teams typically expect enterprise-grade devices from approved vendors, the broader hardware ecosystem often introduces components and equipment that do not originate from the organization’s procurement process.

MFA Isn't Enough: How Attackers Bypass Authentication and What Actually Stops Account Takeovers

Multi-factor authentication (MFA) became the industry’s default safeguard for login security. Yet attackers now bypass MFA at scale, often in seconds. Banks, fintech platforms, and digital enterprises are discovering the hard truth. MFA isn’t account takeover (ATO) prevention. It only verifies the user – and attackers have learned to compromise the session itself. Modern ATO defenses must protect beyond the login, inside the browser, and in real time.

Ep 10 - Beyond CVEs: Why Patching Isn't Enough to Stop Breaches

Most security teams obsess over patching CVEs—but even perfect patch compliance won’t keep you safe. In this episode, SafeBreach Co-Founder & CTO Itzik Kotler and VP of Sales Engineering Michael De Groat reveal the real exposures that hide between patches, from misconfigurations and identity gaps to insider threats, social engineering, and zero-days. Hear why attackers exploit more than just known vulnerabilities, and how adopting an assumed-breach mindset with adversarial simulation strengthens real-world resilience.

Ep 12 - Women in Cyber: Voices of Resilience and Change

Celebrate Women in Cyber Day with us on this episode of the SafeBreach podcast! We explore the evolving role of women in cybersecurity, diving into the unique challenges and privileges they face in a traditionally male-dominated field. Our guests discuss the power of mentorship, confidence, and community support, while highlighting the importance of tailored training and leadership representation. Tune in to hear inspiring insights on how creating opportunities and connections can help build a more inclusive and diverse cybersecurity landscape.