Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Safe Connections: The Overlooked Role of WiFi QR Codes in Marketing

QR codes have become an everyday part of digital marketing - from restaurant menus to event check-ins. They're fast, frictionless, and widely adopted. Yet behind the convenience lies a challenge: how to keep customers secure while making those connections effortless. One overlooked area is WiFi sharing. A safe WiFi QR code generator allows businesses to provide instant internet access without exposing sensitive credentials, bridging the gap between customer experience and cybersecurity.

Advanced Domain Protection and Threat Takedown Solutions for Cybersecurity

The digital landscape has become increasingly hostile, with cybercriminals exploiting domain vulnerabilities to launch sophisticated attacks against organizations worldwide. As businesses expand their online presence, the need for robust domain protection and effective domain takedown mechanisms has never been more critical. Modern enterprises face an evolving threat landscape where malicious actors register deceptive domains to steal credentials, distribute malware, and damage brand reputation through sophisticated phishing campaigns.

5 AI Mandates from Your Board: A Boardroom Mandate for AI-Driven Efficiency

In 2025, AI in cybersecurity is no longer optional—it’s a board-level expectation. CISOs aren’t being asked if they’re using AI; they’re being asked to show measurable outcomes: faster response, reduced noise, greater visibility, and ROI the board can trust. Security operations have become a boardroom priority.

What is an Enterprise Risk Retainer?

Organizations today are under pressure to effectively respond to acute risk events that can threaten financial stability, regulatory compliance, executive safety and stakeholder trust. Hear from Managing Director Nickolas Savage on the importance of getting the right support quickly, while maintaining cost efficiency and operational resilience.

EP 15 - Why banks need to treat machine identities like VIPs

In this episode of Security Matters, host David Puner speaks with Andy Parsons, CyberArk’s Director of EMEA Financial Services and Insurance, whose career spans from the British Army to CISO and CTO roles in global financial institutions. Andy shares hard-earned lessons on leadership, risk management, and the evolving cybersecurity landscape in banking—from insider threats to machine identity governance and the rise of agentic AI.

The Invisible Trick: How to Fool an AI Agent

The Invisible Trick: How to Fool an AI Agent A10 Networks' security experts, Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar, discuss a classic example of an adversarial attack that tricks an AI agent using the equivalent of invisible watermarks. Madhav explains how researchers used an invisible watermark in a research paper that, when scanned by an AI agent, would automatically trigger a positive review. This watermark was not visible to human reviewers. This clever manipulation highlights a significant vulnerability in AI models: they can be influenced by hidden data in their input.

Apono Releases MCP Server for End Users

We’re excited to announce the launch of our MCP server for end users, designed to boost engineering productivity while keeping security strong. Engineers often know exactly what they need to do—deploy to a new environment, spin up a workload, investigate logs—but not which permissions translate into those tasks. That leads to two common problems: The result is wasted time, frustrated teams, and an inflated attack surface from unnecessary standing privileges.