Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DSPM for AI: Securing Data in the Age of Artificial Intelligence

Organizations across industries are adopting AI at a rapid pace. From utilizing this newer technology to process data and conduct business-critical tasks to individual employees experimenting with Gen-AI to enhance their workflows, artificial intelligence now touches multiple points of an organization's operations.

Critical jsPDF Vulnerability Enables Arbitrary File Read in Node.js (CVE-2025-68428)

In January 2026, a critical security vulnerability was disclosed in jsPDF, a popular JavaScript library used to generate PDF documents. The issue, tracked as CVE-2025-68428, affects server-side Node.js deployments of jsPDF prior to version 4.0.0 and has been assigned a CVSS score of 9.2. The vulnerability is a path traversal issue that can be abused to read arbitrary files from the local filesystem.

AI 2026: A Look Ahead

2026, the perfect time to reflect on how far technology has come and what lies ahead. Without a doubt, Artificial intelligence has gone from a niche to an omnipresent force, reshaping how we work, build, and defend. While organisations have speed-ran the adoption of AI and machine learning, cybercriminals have been just as fast to exploit them, and AI now powers business decisions, customer interactions, and – predictably – cyberattacks.

The Silent Killer in Security Stacks: Configuration Drift | Todd Graham x Garrett Hamilton

The silent killer in modern security programs? Garrett Hamilton and Todd Graham discuss how the real killer is settings quietly slipping out of alignment over time — even in environments packed with “best-in-class” tools and clean audit results. Misconfigurations don’t announce themselves. They accumulate. They age. They slowly pull your security posture away from original intent. What teams think is “turned on” often isn’t enforced consistently — or at all. Without continuous validation, drift becomes invisible risk.

How to choose the best regulatory compliance software: A buyer's guide

With regulations evolving faster than ever due to new technologies, emerging threats, and global market trends, maintaining the expected compliance posture is becoming increasingly complex and time-consuming. ‍ Today, many organizations struggle to update systems and processes in response to regulatory changes, all while maintaining core business activities.

PGA of America Trusts LevelBlue as Official Cybersecurity Advisor

LevelBlue and the PGA of America share a commitment to excellence under pressure. As the Official Cybersecurity Advisor of the PGA of America, LevelBlue brings championship standards of protection, continuity, and trust to the organizations that keep the game - and business - moving forward. From fairways to firewalls, LevelBlue safeguards mission-critical operations, member data, and high-profile events with always-on defense, accelerated response, and expert-led security operations powered by AI-driven threat intelligence.

How AI is Re-Building the Cybersecurity Landscape with Max Lamothe-Brassard from LimaCharlie [280]

On this episode of The Cybersecurity Defenders Podcast we're starting the new season off with the hottest topic of 2025: AI. Join an in-depth discussion January 20, 2026 and witness LimaCharlie's fundamentally different approach to AI-powered security operations. Sitting down with Maxime Lamothe-Brassard, Founder and CEO of LimaCharlie, we discuss the ways AI has rapidly changed how companies are building security tools.

Why Transparency Is Critical to Cyber Resilience in the Financial Sector

Transparency isn’t optional—it’s foundational to cyber resilience. In this clip from the Exposed: Cyber Risk in the Financial Sector and its Supply Chain webinar, Roland Cloutier, Global CSO and Digital Business Enablement Executive (TikTok, ADP, EMC), explains why visibility across the financial ecosystem is essential for managing third-party risk and preventing cascading cyber attacks.