Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Network Validation Matters and Why GigaOm Names Forward Networks as a Leader and an Outperformer

Enterprise networks are highly dynamic environments. They span campuses, data centers, and multiple clouds, requiring constant maintenance. Configuration updates, security policies, patches, capacity shifts, and automation-driven enhancements occur continuously. At this scale and velocity, every change carries risk unless it is verified against intended network behavior.

How Cyberhaven Uses Data Lineage to Revolutionize DLP

The concept of data loss prevention (DLP) is simple: stop sensitive information from leaving your organization through unauthorized channels. But in practice, traditional DLP solutions struggle to deliver on that promise. They rely on rigid rules, limited visibility, and a shallow understanding of how data is actually used. The result is missed threats, noisy alerts, and frustrated security teams.

OT resilience demands rapid recovery: Rethinking traditional backup

Industrial organizations face a stark reality: Downtime is costly, disruptive and cannot be entirely prevented. Whether it’s a cyberattack, hardware failure or simple data corruption, operational technology (OT) environments must be ready to recover quickly. In a recent podcast, Stephen Nichols, Country Manager for Canada at Acronis, shared his perspective on why rapid recovery is now a fundamental pillar of industrial resilience and how modern backup strategies are evolving to meet the challenge.

Introducing WatchGuard's Zero Trust Bundle: Zero Trust for the Way You Work

Hybrid work, cloud apps, and constant connectivity have completely reshaped how people get things done. But they've also reshaped how attackers operate. Today, most breaches begin with fundamental issues: stolen credentials, compromised devices, or remote access tools that weren't designed for a world of distributed users. That's why WatchGuard is introducing the Zero Trust Bundle, a unified approach that secures people, devices, and access decisions every time someone connects to your business.

EP 21 - When attackers log in: Pausing for perspective in the age of instant answers

In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk’s Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today’s attackers aren’t breaking in—they’re logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.

Are LLMs becoming messengers for attackers? #ai #cybersecurity

AI assistants with broad enterprise access are creating a new attack vector. Chris Luft and Matt Bromiley discuss the Gemini Jack vulnerability, where attackers used prompt injection to turn Google's AI assistant into an unwitting accomplice in data exfiltration. The attack embedded hidden instructions in documents or emails. When employees asked Gemini normal questions like "show me our budgets," the AI retrieved the poisoned document and executed the attacker's commands without anyone clicking anything.

If You Can't Block It, You Don't Secure It. #mitigation #cyberdefense #apisecurity #blocking

Detection is information; Blocking is mitigation. For Business Logic Abuse, simple detection alerts are not enough. Your tools must be able to actively block those manipulative, stateful attacks in real-time. Furthermore: Stop "one-and-done" security testing! You must continuously tune your testing by adopting an adversary's perspective. Tune your defense as constantly as attackers tune their exploits.

Building an Intelligent and Autonomous Search Agent at Egnyte

Finding the right information quickly is a necessity for our customers—they rely on Egnyte to manage 100s of petabytes of data, from financial reports and legal contracts to marketing assets and engineering plans. Until now, we provided this capability through a powerful search engine equipped with keyword matching, boolean operators, and UI-based filters. But, as the volume and complexity of data grow, traditional search becomes a frustrating exercise in guesswork.

Misconfigurations Are Still Owning Security Teams

Garrett Hamilton sat down with Todd Graham, Managing Partner at Microsoft’s venture fund, M12, to talk about why M12 invested in Reach and why our mission was a no-brainer for him. Nation-state attacks make the headlines—but most people are getting owned by misconfigured servers, networks, and controls hiding in plain sight. Turns out the problem isn’t what teams don’t own. It’s what they do own that isn’t, in most cases, even turned on.

Why "We Thought It Was On" Keeps Leading to Breaches

At UC Irvine’s Digital Leadership Agenda 2026, moderated by Nicole Perlroth, Garrett Hamilton illustrates what those blind spots can look like: “We believed it was deployed.”“It was turned on.”“It should have stopped this.” Except one exception, one policy gap, one control not applied at scale — and assumptions replace reality. The real problem isn’t visibility. It’s continuously validating intent against execution.