Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

November Release Rollup: Contract Analyst, Deep Research Agent, and More

We’re excited to share new updates and enhancements for November, including: For more info on these updates, check out the list below and dive into the detailed articles. In addition, this month we’re excited to announce the Egnyte Community. Join the Egnyte Community to get the latest updates, chat with experts, share feedback, and learn from other users.

Intel Chat: AI takes over entry work, AI cyber espionage, JackFix & weaponizing Blender files [272]

Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Why a Cloud SIEM Just Makes Sense

The irony of being an adult working in IT and security is that where having your head “in the clouds” was inappropriate as a child, today most of your activities require you to have your head in the cloud. Organizations moved their business operations to the cloud because they could achieve various operational benefits, like improved collaboration and reduced costs. Yet, many companies still maintain an on-premises SIEM.

Best Application Security Testing Providers: Top 7 in 2025

Top application security testing providers include Mend, Invicti, and Black Duck, offering a range of services like Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Software Composition Analysis (SCA). Some providers also provide specialized services like securing AI applications and vulnerability management.

UK's New Cyber Bill Fortifies Defenses

The services we rely on daily—healthcare, transport, energy, and water—are the backbone of our society. An attack on these systems can cause massive disruption, affecting everything from hospital appointments to the power in our homes. In response to this growing threat, the UK government introduced the Cybersecurity and Resilience Bill on November 12, 2025, a landmark piece of legislation designed to significantly strengthen the nation’s defenses against cyber-attacks.

Solving Human Risk: Automate Governance and Prioritize Action

In our previous blog post, “Closing the Visibility Gap,” we established that visibility is the first step in managing the modern human attack surface; however, prioritizing that data is the next major concern for any CISO. Prioritization of human risk data is critical, as it directly informs governance and effective high-level decision-making. Simply put, prioritization is crucial to driving action.

Detect and block exposed credentials with Datadog Secret Scanning

Securing secrets is a difficult task. Developers frequently hardcode credentials for quick testing or use AI-generated code snippets that include live API keys or tokens. This means that enterprise secrets can inadvertently make their way into repositories and pipelines, exposing organizations to security and compliance risks without anyone noticing. When a secret is committed to a repository, it spreads quickly across branches, becomes difficult to track, and leads to leaks that are hard to clean up.

Secure your code at scale with AI-driven vulnerability management

As development teams adopt generative AI at an unprecedented pace, security teams face an evolving set of challenges in securing the software development life cycle. The increasing speed and scale of code changes make it more difficult for organizations to manage risk effectively. Legacy scanners often fail to keep up, returning slow results and noisy alerts that increase remediation time and leave organizations exposed to potential breaches.

Datadog Cloud SIEM: Driving innovation in security operations

Security can quickly become overwhelming for large organizations, with teams processing logs that are fragmented across cloud providers and SaaS platforms, staggering alert volumes, and the need to scale operations efficiently as environments grow. Datadog Cloud SIEM is designed to help teams manage this workload by centralizing insights, detecting threats faster, and prioritizing investigations with rich risk context.

Windows Imaging and Deployment: The Best Tools, Methods, and Tips

Setting up a new PC at home and realizing you have to reinstall Windows, download all your apps, and redo your settings from scratch - more than once, can be incredibly tedious and time-consuming. Now imagine your PC is freshly set up with a clean version of Windows, all your drivers installed, your favorite apps ready to go, and your personal settings restored within 30-40 minutes. No stress, no waiting, just a perfectly working computer exactly how you like it.