Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Featured Post

Provision 29 Is Coming: Why Identity Security Must Now Be a Boardroom Priority

Starting January 2026, Provision 29 of the UK Corporate Governance Code will require boards to report annually on the continuous effectiveness of their internal controls, including cybersecurity, or risk a substantial fine. In terms of reporting, Provision 29 marks a shift from "Do we have controls?" to "Can we prove they work?"

Exabeam Appoints Pete Harteveld as CEO

BROOMFIELD, Colo. & FOSTER CITY, Calif. - October 8, 2025 - Exabeam, a global leader in intelligence and automation that powers security operations, today announced Pete Harteveld as Chief Executive Officer. The leadership transition follows the decision by Chris O'Malley to step into retirement after three years of dedicated service to the company and over 30 years of executive leadership.

Miggo Security Named a Gartner® Cool Vendor in AI Security

Miggo Security, pioneer and innovator in Application Detection & Response (ADR) and AI Runtime Defense, today announced it has been recognized as a Gartner Cool Vendor in AI Security. To us, this recognition underscores Miggo's mission to close the detection-to-mitigation gap that plagues security teams today by providing comprehensive, fast, and precise analysis and response for what applications actually do at runtime.

Egnyte to Share New Intelligent Data Environment Capabilities at Procore Groundbreak

MOUNTAIN VIEW, Calif., Oct. 08, 2025 (GLOBE NEWSWIRE) -- Egnyte, a leader in secure content collaboration, intelligence, and governance, will showcase the latest enhancements to its AI-powered cloud collaboration platform for the architecture, engineering, and construction (AEC) industry at this year's Procore Groundbreak in Houston, TX.

Rethinking Security Posture Assessments

Security posture assessments are a foundational part of any security program. They’re how organizations take stock of their defenses, evaluate coverage, and identify gaps. But in practice, many posture assessments have become stuck in a pattern. They follow the same checklist, occur on a set routine, and result in a static document that often doesn’t translate into real change. The problem isn’t that posture assessments are irrelevant.

The New CISO Podcast Ep.134 - Evan Ferree | From Breach to BISO: Becoming a Security Influencer

Most security professionals know what a CISO does. But what about a BISO? And why are Fortune 500 companies increasingly creating this executive role? In this episode of The New CISO Podcast, host Steve Moore sits down with Evan Ferree, Staff Vice President and Business Information Security Officer at a Fortune 50 company, to decode one of cybersecurity's most misunderstood leadership positions. What You'll Learn.

Unlock success: Powerful strategies for integrating ESG into GRC for sustainable compliance

The modern business landscape is evolving rapidly with increasing expectations from investors, regulators, and consumers alike. Today, environmental, social, and governance (ESG) considerations are no longer optional; they have become a critical piece of corporate strategy. However, aligning these initiatives with governance, risk management, and compliance (GRC) frameworks can be a challenge.

CloudCasa Now Supports NFS Backup Targets - More Flexibility for Kubernetes Environments

CloudCasa for Kubernetes just got more versatile. In addition to object storage targets such as Amazon S3, Azure Blob, and other S3-compatible platforms, CloudCasa now supports NFS (Network File System) as a backup destination. This enhancement gives organizations even greater flexibility when choosing how and where to store their Kubernetes backups — whether in the cloud, on-premises, or both.

Closing the credential risk gap for AI agents using a browser

AI agents increasingly are completing real tasks in the browser, acting on behalf of employees, and connecting to the same systems humans rely on to get work done. This introduces a new security problem: AI agents require credentials – passwords, API keys, and one-time codes – to operate. As agents proliferate, the risk surface increases and it brings a variety of identity and access management challenges.

Quantum Computing and How it Breaks RSA | Ep. 1 - Quantum Learning Series

On October 7, 2025, the Nobel Prize in Physics was awarded to John Clarke, Michel H. Devoret, and John M. Martinis for their work with superconducting circuits and Josephson junctions—experiments that proved quantum mechanics can govern entire electronic systems, not just individual particles. Their discoveries laid the foundation for today’s quantum computers. Quantum computing is now redefining what’s possible in data security. In Episode 1 of the Quantum Learning Series, we explore what quantum computing really is—and why it poses such a powerful threat to modern encryption.