Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP 20 - Why agentic AI is changing the security risk equation

As enterprises embrace agentic AI, a new security risk equation emerges. In this episode of Security Matters, host David Puner sits down with Lavi Lazarovitz, VP of Cyber Research at CyberArk Labs, to unpack how AI agents and identity security are reshaping the threat landscape. Learn why privileged access is now the fault line of enterprise security, how attackers exploit overprivileged AI agents, and what security teams must rethink before scaling AI. Packed with real-world examples and actionable insights, this is a must-listen for anyone meeting the challenges of AI and cybersecurity.

Survey: Continuous Monitoring Emerges as Top Priority for Security Leaders in Germany

German cybersecurity teams are making meaningful progress in exposure management, but critical gaps remain that limit their ability to reduce business risk. That’s one of the key takeaways from Bitsight’s State of Cyber Risk and Exposure 2025 report, which surveyed 1,000 cyber risk professionals globally, including 150 based in Germany.

Threat Exposure Management: A Better Way to Answer "How Exposed Are We?"

Security leaders are asking a new question with greater urgency: How exposed are we? In an era where every application, identity, and integration expands the attack surface, answering that question with clarity is no longer optional. The traditional model of vulnerability management cannot keep up. Findings come in faster than they can be addressed. Visibility is fragmented. Risk prioritization is often based on severity scores rather than business impact.

How to Setup SAML SSO for Confluence with a Custom Identity Provider (IdP)

This step-by-step video tutorial walks you through the complete configuration of the miniOrange SAML SSO for Confluence plugin using a Custom Identity Provider. Learn how to set up secure Single Sign-On (SSO) for your Confluence users, verify the integration, and experience seamless login using your Custom IdP. Timestamps: With this plugin, you can: Enable secure login to Confluence using your Custom IdP credentials Configure SAML responses and user attributes as per your IdP Map IdP user groups to Confluence roles for access control Improve user experience with seamless authentication.

Stop Just Reacting: Why Your Security Needs a Threat Intelligence Platform (TIP)

In today’s digital landscape, the volume and complexity of cyber threats are staggering. Security teams are constantly drowning in a tsunami of data—raw threat feeds, security alerts, and endless reports. Consequently, this data overload leads to alert fatigue, making it nearly impossible to distinguish a critical, targeted attack from simple digital background noise. Furthermore, if you’re relying on manual processes and disparate tools, you’re always playing catch-up.

Active Directory Management Challenges You Must Know in 2026

Picture this: an organization rolls out a small policy update on a Friday evening, expecting to fix a few login issues. By Monday morning, half the users can’t access their accounts, help desk tickets are flooding in, and the IT team is scrambling to trace what went wrong. That’s how quickly a single misconfiguration in Active Directory can snowball into a full-blown business disruption.

INETCO named among top innovators in the FRC Innovation List

We’re proud to share that the INETCO BullzAI transaction firewall has been named among top innovators in the FRC Innovation List – November 2025, a showcase of technologies driving major advancements in financial risk and compliance. Read the full announcement from FRC (Finance, Risk and Compliance). This recognition highlights the growing need for real-time intelligent protection as payment ecosystems evolve and cyber threats accelerate.

How Computer Security Has Evolved and What You Can Do Now

You may not often think about how far computer security has come over the last 30 years; the evolution is remarkable. Early attacks, such as viruses, passed around on floppy disks, worms spreading for notoriety, and hacktivism done for a cause felt more punk rock than organized crime. Today, according to Canalys, ransomware is the top concern for small businesses. But will it stay that way?