Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

International AI Safety Report 2026: What It Means for Autonomous AI Systems

The International AI Safety Report 2026 is one of the most comprehensive overviews to date of the risks posed by general-purpose AI systems. It’s compiled by over 100 independent experts from more than 30 countries, and shows that while AI systems are performing at levels that seemed like science fiction only a few years ago, the risks of misuse, malfunction, and systematic and cross-border harms are clear. It makes a compelling case for better evaluation, transparency, and guardrails.

AI Agents Are The New Detection Problem Nobody Designed For

AI agents now operate as core identities in enterprise environments, authenticating, accessing data, and executing workflows at machine speed. Their flexibility and scale introduce a detection challenge traditional security models were never built to solve. Exabeam has seen this pattern before with insider threat and workload identities. AI agents accelerate the need for identity-centric detection.

Moltbook Data Exposure - The 443 Podcast - Episode 357

This week on the podcast, we cover a recent supply chain compromise involving the popular text editor Notepad++. After that, we discuss a recent vulnerability report in the Moltbook AI social network before ending with a deep-dive review of a recent remote code execution vulnerability in the N8N automation platform.

Why identity security is foundational for crypto agility in the post-quantum era

Cryptographic failures have a knack for turning a quiet weekend into a chaotic, all-hands-on-deck emergency. Consider the SHA-1 to SHA-2 deprecation, sometimes referred to as “Shapocalypse,” which sent teams scrambling to reissue thousands of certificates and exposed how many legacy systems weren’t ready for stronger hash algorithms. The major Certificate Authority (CA) distrust events involving DigiNotar in 2011, Symantec in 2017-18, and Entrust in 2024-25 created similar disruption.

Navigating the IT Maze

Growth is the ultimate goal for almost every business. For many long-established organizations, the quickest path to that goal is through acquisition. Mergers and acquisitions (M&A) open doors to new markets, new capabilities, and new revenue streams. However, for the IT teams responsible for integrating these new entities, the reality is often less about celebration and more about survival.

IT Giveth, Security Taketh: The Hidden Cost of Configuration Drift

“IT giveth. Security taketh.” A topic examined in a print interview with Colt Blackmore, co-founder & CTO of Reach Security, written by Dan Raywood at Security Boulevard: ︎ The long-standing friction between IT enablement and security restriction︎ Configuration drift as the quiet divergence between intended and actual state︎ How incremental change accumulates into measurable risk︎ The challenge of maintaining alignment in complex, fast-moving environments︎ Why drift often remains invisible until consequences surface.

BDRShield v9.0.0 Now Available: Cloud-Managed VM Backups and Server Proxy for Distributed Environments

We are excited to announce the release of BDRShield v9.0.0, a milestone update that fundamentally changes how organizations manage virtualized, distributed, and multi-geo backup environments from the BDRShield Cloud management...

Enrich logs with ServiceNow CMDB context before routing to any SIEM or logging tool

Many DevOps and security teams rely on ServiceNow CMDB (Configuration Management Database) as the system of record for metadata about infrastructure assets, application and service ownership, and dependencies. ServiceNow CMDB captures which team owns each service, what business unit the service supports, the environment where it runs, and how assets relate to each other.

Managed EDR: How It Works, Where It Delivers Value, and Where It Falls Short

Endpoint threats no longer appear with warning signs. They now blend into normal activity, making detection difficult. Once inside, these threats move quietly across systems without being noticed. By the time security teams notice them, damage is already done. This shift has led to the rise of Endpoint Detection and Response. But EDR alone was not sufficient in many cases. This is when Managed EDR was introduced to fill that gap.