Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A New Model You Haven't Heard About (GitHub Raptor Mini)

Can an under-the-radar AI tool actually build a secure, functional CRUD note-taking app from scratch? In this video, I put GitHub Raptor Mini to the test to see if it can design, implement, and reason through a real-world CRUD application — including authentication, data handling, and basic security considerations.

5 Integrations that Make CNAPP Ideal for Cloud Environments

Cloud-native application protection platforms (CNAPPs) converge cloud security posture management (CSPM), cloud workload protection platform (CWPP), data security posture management (DSPM), and vulnerability management. They secure cloud infrastructure across multi-cloud environments. As 2025 progresses, organizations continue to battle increasing cloud security challenges, where security and compliance issues remain the primary barriers to cloud adoption, cited by 61% of organizations.

What Are AI Browsers and Why Are They Becoming Essential?

AI browsers are a revolutionary change in our internet interaction. These web browsers use artificial intelligence as smart assistants. They understand user intent, summarize content, and automate tasks. Unlike traditional browsers, AI browsers provide a conversational and efficient experience. They move beyond one-time searches to offer a truly personalized interaction. This article explores their core features and concrete advantages. We'll examine how they save time, enhance security, and adapt to your unique needs. This makes a compelling case for why they are the new standard.

How GenAI is Changing Data Security and What Enterprises Must Do

Generative AI (GenAI) is changing data security in today's businesses. It affects both cybersecurity defenses and the types of threats we face. Organizations encounter innovations that boost detection and automate tasks. However, these changes also create new avenues for attack. Security leaders must understand this duality to protect systems and information. This article examines the dual impact of GenAI on enterprise security. We cover the opportunities it creates for defense and the new risks it introduces. Finally, we outline actionable strategies to protect your organization.

APT Teens, AI Voices and 2025 Helpdesk Attacks

The 2025 year in review episode shows how advanced threat groups rely on simple steps, from infostealer credentials to AI voice tools, to work through helpdesks. Native language, fake confusion and social engineering still unlock password resets in 2025, opening the door to ransomware and double extortion across networks.

AI Automation Dreams in the 2025 Security Budget Squeeze

The Razorwire Christmas Party 2025 review looks at rising expectations for AI and automation while security budgets stall in real terms. Automation in 2025 sits in a tug of war between cost cutting targets and the reality that attackers also use AI, so defensive upgrades have to match a live, adaptive threat.

Raising the Bar for Mobile Security: Reflections on 2025 and What 2026 Demands of Us

As 2025 comes to a close, it’s worth pausing, not to slow down, but to reflect on how rapidly the mobile security landscape is evolving and what that evolution now demands from all of us. This year reinforced something we have long believed at Appknox: security can no longer be an isolated activity or a late-stage control. As mobile applications become more interconnected, AI-enabled, and globally distributed, security must operate continuously and at scale, without slowing teams down.

Attackers Aren't Hacking Anymore - How Misconfigurations Became the Front Door

Looking for the perfect easy listening experience to kick off the holidays? We just published a full conversation between Garrett Hamilton, CEO & Co-Founder of Reach Security, and Todd Graham, Managing Partner at Microsoft’s venture fund M12. They talk through what's limiting security programs today — not lack of tools, but lack of operational clarity.