Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Howler Episode 23 - Matthew Trushinski, Vice President of Product Marketing

This month we sit down with Matthew Trushinski, Vice President of Product Marketing, as he shares how he cultivates creativity & innovation within himself and his team, skills he thinks all product marketers should have, and so much more! Matthew Trushinski has a diverse technology marketing background including carrier networks, IoT, smart cities, AI and security. As the Vice President of Product Marketing for Arctic Wolf, he works with customers and prospects to improve their security operations.

PCI DSS 4.0.1: A Field Guide to Requirements 6.4.3 & 11.6.1

By the time you reach PCI DSS 4.0.1 Requirements 6.4.3 and 11.6.1, the easy wins are behind you. This is the point where compliance turns into configuration. Tag managers, consent scripts, and payment flows all intersect here, and the guidance feels just vague enough to slow everything down. Which tag rules belong in scope? How do you prove a script was authorized? What’s the right way to detect a change without flooding alerts?

EP 18 - The humanity of AI agents: Managing trust in the age of agentic AI

In this episode of Security Matters, host David Puner sits down with Yuval Moss, CyberArk’s VP of Solutions for Global Strategic Partners, to explore the fast-evolving world of agentic AI and its impact on enterprise security. From rogue AI agents deleting production databases to the ethical blind spots of autonomous systems, the conversation dives deep into how identity and Zero Trust principles must evolve to keep pace. Yuval shares insights from his 25-year cybersecurity journey, including why AI agents behave more like humans than machines—and why that’s both exciting and dangerous.

When AI Joins the Cybercrime Underworld: How Far Ahead Are Hackers Now?

In this week's episode, discover how AI-driven attacks are rewriting the rules of cybersecurity. Phishing is nearly impossible to spot, deepfakes target companies, and self-evolving malware is changing the game. Meet the new adversary: artificial intelligence. Watch the full discussion in this week's show.

Meet Jit's AI Agents: The Future of Product Security Work

Application security has become too complex — too many scanners, too much noise, and not enough time. Jit’s AI Agents change that. Built on Jit’s Agentic ASPM Platform, these intelligent agents don’t just detect issues — they think like your best AppSec engineer. They correlate findings across systems, validate real attack paths, generate human-in-the-loop fixes, and continuously monitor what actually matters to your business.

Continuous PCI DSS Compliance with File Integrity Monitoring

PCI DSS compliance is often seen as a one-off task, that is, you do the audit, implement controls, and then move on. But then there comes the problem - systems aren’t static, meaning that files, scripts, and configurations change constantly, and even small untracked changes can create gaps that lead to non-compliance or security issues. This is where File Integrity Monitoring (FIM) comes in.

5 Essential Steps to Strengthen Kubernetes Egress Security

Securing what comes into your Kubernetes cluster often gets top billing. But what leaves your cluster, outbound or egress traffic, can be just as risky. A single compromised pod can exfiltrate data, connect to malicious servers, or propagate threats across your network. Without proper egress controls, workloads can reach untrusted destinations, creating serious security and compliance risks.

Why Risk Assessments Fail Stakeholders: Bridging the Gap

You've been here before. The vendor risk assessment is complete, the report is generated, and it lands on a stakeholder's desk. And yet, this comprehensive, detailed document, which provides vital information on a vendor's security posture, goes nowhere. The handoff lands in limbo.

The Do's & Don'ts of Writing Audit-Proof Risk Assessments

When an auditor walks through your door, they aren't looking for a list of vulnerabilities; they're looking for proof that your Third-Party Cyber Risk Management (TPCRM) program is consistent, defensible, and robust. Internal and external auditors evaluate the Vendor Risk Management process by testing evidence, but they do so with different goals.