Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 Critical LLM Privacy Risks Every Organization Should Know

Large language models take in unstructured data. They transform it into context, embeddings, and answers. That journey touches raw files, vector stores, model logs, and third-party services. Traditional privacy programs focus on databases and forms. LLMs push risk to the edges. The riskiest moments are when you ingest messy content, when your system retrieves chunks to support an answer, and when an agent with tool access is tricked into over-sharing.

EP 19 - Trust under attack: Spies, lies, and the new face of cybercrime

Eric O’Neill, former FBI ghost and author of “Spies, Lies & Cybercrime,” joins host David Puner to take a deep dive into the mindset and tactics needed to defend against today’s sophisticated cyber threats. Drawing on O’Neill’s experience catching spies and investigating cybercriminals, the conversation explains how thinking like an attacker can help organizations and individuals stay ahead.

Beyond Your Code: A Guide to Software Supply Chain Risk Management

The code your team writes is only a fraction of what ends up in your final product. For many teams, the majority is open-source code from third-party packages. This reliance on external dependencies creates a complex software supply chain, and each link in that chain is a potential entry point for attackers.

Top Secrets Management Tools in 2026

Organizations rely on a combination of internal systems and cloud services to run their business, all of which require sensitive credentials, such as API keys, SSH keys, database passwords, tokens and certificates. Secrets management refers to the storing, organizing and managing of these credentials to prevent unauthorized access.

More Regulatory Scrutiny Means IRR Must Be a Priority | SEC, NIS2, and CIRCIA Compliance Insights

As global cybersecurity regulations tighten, security leaders are under increasing pressure to demonstrate strong Incident Readiness and Response (IRR). New requirements like the SEC cybersecurity disclosure rules, the EU’s NIS 2 Directive, and the forthcoming CIRCIA mandate faster reporting, stronger governance, and greater accountability. In this session, LevelBlue experts share insights from a survey of 500 security leaders on how organizations are adapting their IRR strategies for today’s regulatory climate.

"Trust in AI Starts with Transparency | Sebastian Goodwin (Autodesk) x Reach Security"

Trust in AI starts with transparency. In our recent conversation, “No Time to Drift,” Sebastian Goodwin, Chief Trust Officer at Autodesk, shares how his team is putting that principle into practice — by creating AI Transparency Cards. Think of them like nutrition labels for AI: clear, consistent, and designed to help customers understand what’s inside. Each one outlines what the model does, how it’s trained, safeguards in place, and more.

Winning risk management in 2026: Harness emerging technology trends for unstoppable success

Risk management has come a long way from outdated spreadsheets and static reports. Today’s dynamic business landscape demands a robust framework that not only responds to threats swiftly but also leverages emerging technology trends to transform potential pitfalls into strategic advantages. In this article, we explore how integrating cutting-edge innovations with risk management techniques can lead to unstoppable success.

Predict and Prevent: How AI is Changing Insider Risk Management

Insider risk has become one of the most urgent and financially consequential cybersecurity challenges for today’s organizations. Insider Risk is a top concern for the C-Suite and Boards, and organizations must be prepared to detect and respond to insider risks. In fact, according to IBM’s Insider Threat Report, 83% of organizations reported at least one insider-related security incident in 2024 (IBM, Insider Threat Report, 2024).

Atlassian Data Center to Cloud Migration: Why miniOrange Is Your Trusted Partner

Migrating from Atlassian Data Center to Cloud is a major step toward modernization. With miniOrange, the process becomes seamless, secure, and fully automated — ensuring no data loss or downtime. Our solutions help you manage users, licenses, and compliance effortlessly while enhancing security and performance. Move smarter and faster with miniOrange to unlock the full potential of Atlassian Cloud.