Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

4 steps teams can take to mitigate Iranian cyberattacks on critical infrastructure

COMMENTARY: When the United States and Israel launched coordinated strikes against Iran on February 28, the security community mobilized around the visible response. I’ve watched that response for two weeks: teams tracking hacktivist DDoS campaigns, incident counts climbing, news coverage following close behind.

AI Application Security: 6 Focus Areas and Critical Best Practices

AI application security protects AI-powered apps, including those powered by large language models ( LLMs), from unique threats like prompt injection, data poisoning, and model theft. It achieves this by securing the entire lifecycle, including code, data, algorithms, and APIs, using specialized tools and processes that go beyond traditional security measures. It involves securing the AI model’s behavior, training data, and outputs.

ManageEngine Key Manager Plus Cloud: An overview

ManageEngine Key Manager Plus Cloud is a cloud-based comprehensive certificate life cycle management solution that helps consolidate, control, audit and automate the entire life cycle of enterprise TLS and SSL certificates. In addition, Key Manager Plus also offers end-to-end Azure Key Vault and application secrets management, and PGP key management. This demo will cover all the key features of Key Manager Plus Cloud.

How does Sisense stay on top of API Attacks?

Sisense powers analytics experiences inside the applications businesses rely on every day. As an API-first platform, securing those connections is critical, especially as AI agents increasingly operate through APIs to access data and trigger workflows. In this conversation, Sangram, CISO and VP of IT at Sisense, and Michael Callahan, CMO at Salt Security, discuss how Sisense approached API security strategically to protect their platform, maintain customer trust, and support innovation in the Agentic AI era.

Context Engineering Is Security Engineering. RSA 2026 Made the Case.

Cisco polled its major enterprise customers before RSA 2026 and found something astounding. 85% of large enterprises are experimenting with AI agents. Only 5% have moved them into production. That's not a technology gap. The models work. The tools exist. The 80-point spread between experimentation and production is a governance gap. It's also a context gap.

Identity and Access Management: The foundation of security

Organizations put in place firewalls, antivirus, intrusion detection and prevention systems, but the bad guys still get in and wreak havoc – often through the front door. Teams need to put strict controls and governance around all identities with access to resources to defend against insider threats.

How to Prevent Phishing Emails by Reducing Human Risk

Organizations have traditionally treated phishing emails as a technology problem to be solved with spam filters and secure email gateways. But with phishing attacks on the rise, these tactics are no longer enough. KnowBe4’s 2025 Phishing By Industry Benchmarking Report found a 47% increase in phishing attacks that bypass Microsoft’s native defenses and secure email gateways. Why do they succeed? Because they exploit reliable human behavior.