Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Gartner's AI TRiSM Market Guide Validates the Urgency of AI Agent Security

AI Agents are not just another tech trend; they are fundamentally reshaping how enterprises operate. These autonomous systems are deeply embedded into workflows, making real-time decisions, executing tasks, and integrating across an organization’s most critical systems. With this shift comes an undeniable reality: enterprises are handing over operational control to AI-driven entities without the necessary governance and security frameworks in place.

Why Pen Testing Is Essential in Today's Cyber Threat Landscape

The digital frontier is expanding quickly, with organizations across every industry depending on interconnected systems to communicate, store data, and drive innovation. However, as technology evolves, malicious actors also refine their tactics. This article examines key defenses that protect today's infrastructures.

Sue Bergamo - Confidentiality, Integrity, and Availability - CIA Triad

“This isn't a job for the faint of heart. If people can't understand the triad that CISOs abide by—confidentiality, integrity, and availability—then it’s our job to make them understand.” Sue Bergamo Exciting news! In our latest episode of Data Security Decoded, we had the pleasure of hosting Sue Bergamo, CIO and CISO at BTE Partners.

How AI-Automated Fuzzing Uncovered a Vulnerability in wolfSSL

Despite wolfSSL’s rigorous software testing practices, in October 2024, Code Intelligence—an application security vendor—discovered a potentially exploitable defect in wolfSSL. Remarkably, the potential vulnerability was found without human intervention. The only manual step was executing a single command to trigger autonomous fuzz testing. Watch the video for a live demo of AI-automated fuzzing.

Penetration testing frequency: Industry-specific best practices

Annual penetration testing serves as the baseline for cybersecurity best practice and can help businesses identify and address vulnerabilities before they turn into exploitable threats. While some businesses assume that once a year pen testing is sufficient, it’s worth understanding that it is a minimum requirement rather than a comprehensive security strategy.

DDI Central 5.1 is here! Supercharge your networks with more power, more control, less hassle

DDI Central has officially launched its latest version, 5.1 (Service Pack 5001), bringing a powerhouse of automation, real-time insights, security, and efficiency to DNS, DHCP, and IPAM (DDI) management. Packed with features and enhancements such as advanced REST APIs, WebSocket-based real-time collaboration, enhanced analytics, and intuitive tools, this update is designed to streamline network operations, enhance visibility, and drive network performance like never before.

Bridging the Gap: Why IT and OT Convergence is Reshaping Manufacturing

The line between Information Technology (IT) and Operational Technology (OT) has been blurring for years and what once were two distinct realms — IT managing data and networks, and OT controlling physical processes on the production floor — are now converging to drive smarter, more efficient manufacturing.

#194 - Exploring MSSP partnerships and tech providers with Raffaele Mautone, CEO of Judy Security

On this episode of The Cybersecurity Defenders Podcast, we explore MSSP partnerships and technology providers with Raffaele Mautone, CEO of Judy Security. Raffaele brings a strong background in IT, sales, and operations, with extensive experience in cybersecurity and IT shaping the foundation of Judy Security. He has a proven track record of leading teams through successful acquisitions, strategic planning, and large-scale program deployments.