Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CrowdStrike Named a Customers' Choice in 2025 Gartner Peer Insights Voice of the Customer for User Authentication Report

CrowdStrike has been named a Customers’ Choice in the 2025 Gartner Peer Insights “Voice of the Customer for User Authentication” report. We have the most five-star ratings of any vendor evaluated in the report and a 97% Willingness to Recommend rating, based on 206 overall responses as of February 28, 2025.

CIO POV: Closing the trust gap in SaaS security

“The modern ‘software as a service’ (SaaS) delivery model is quietly enabling cyber attackers and—as its adoption grows—is creating a substantial vulnerability that is weakening the global economic system.” These are the words of JPMorgan Chase CISO Patrick Opet in an open letter to third-party suppliers that has gone viral, at least in the cybersecurity world, and sparked a broader conversation about building trust in cyberspace.

The Growing Threat: Cybersecurity Challenges for SMBs in 2025

Hackers no longer target only the large players. In fact, cyberattacks on small to medium-sized businesses (SMBs) are becoming increasingly prevalent, with greater accuracy, frequency, and impact. Whether you operate an e-boutique or an offshore-first marketing firm, cyber threats are pounding at your virtual door-and they're not knocking, they're demanding entry. So, what's new? And why are SMBs now such tempting targets? Let's get to the bottom of it.

Why Cybersecurity Is One of the Most In-Demand Careers of the Decade

Every 39 seconds, another cyberattack hits somewhere in the world. Ransomware gangs are making headlines for crippling hospitals, AI-powered threats are getting more sophisticated by the day, and practically every business from your local coffee shop to Fortune 500 companies are realizing they're potential targets. The old days of thinking "we're too small to be noticed" are over. With the global cybersecurity workforce shortage reaching over 3 million unfilled positions, companies aren't just looking for cybersecurity professionals anymore, they're desperately hunting for them.

What Is Residential Mental Health Treatment and How Does It Work?

When everyday life becomes too heavy and outpatient care isn't enough, residential mental health treatment can offer the support and structure needed to heal. It's more than just staying somewhere, it's a full-time, live-in program designed to help people work through mental health challenges in a safe, supportive setting. With 24/7 care, therapy sessions, and personalized plans, it provides a steady routine focused on recovery.

BlueVoyant Unveils New SBOM Capabilities as Part of Its Leading Third-Party Cyber Risk Management Solution

BlueVoyant's new Software Bill of Materials (SBOM) management offering, powered by SBOM leader Manifest, enables organisations to efficiently analyse and reduce third-party risks from commercial software.

Aembit Extends Workload IAM to Microsoft Ecosystem, Securing Hybrid Access for Non-Human Identities

Aembit, the workload identity and access management (IAM) company, today announced a major expansion of its platform to support Microsoft environments. With this launch, enterprises can now enforce secure, policy-based access for software workloads and agentic AI running on Windows Server, Active Directory, Microsoft Entra ID, and Azure - while extending that same access model to third-party clouds, SaaS tools, and partner environments.

Random but Memorable - Episode 15.0: 150th Episode Special

Random but Memorable turns 150! (It’s official, we’re old.) To celebrate, we play some special messages submitted by you – our listeners and customers – along with our own 1Password employees. We’re even sharing some crowdsourced 1Password tips for good measure. We also host a very special Archive Edition of Watchtower Weekly. We look back at some of the historic news stories we covered in 2018 and reflect on how the world of cybersecurity has changed.

DeepSight by Protecto: AI-Native Sensitive Data Detection for Developers

Thanks to a wide range of use cases that automate manual activities, enterprises are rushing to integrate GenAI into their IT stack, only to realize they’ve hit a privacy wall. A concerning number of use cases involve the use of sensitive data like PII and PHI, risking data privacy and compliance. Enterprises today are becoming increasingly aware of these multifaceted risks associated with unfiltered AI usage and turning to the common solution available in the market – AI privacy tools.