Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How CrowdStrike Trains GenAI Models at Scale Using Distributed Computing

Large language models (LLMs) have revolutionized artificial intelligence and are rapidly transforming the cybersecurity landscape. As these powerful models become commonly used among both attackers and defenders, developing specialized cybersecurity LLMs has become a strategic imperative. The CrowdStrike 2025 Global Threat Report highlights a concerning trend: Threat actors are increasingly enhancing social engineering and computer network operations campaigns with LLM capabilities.

Zenity 2025 Year in Review: Building AI Security for the Enterprise

For security teams, the adoption of agents showed up operationally before it showed up strategically - creating new expectations and requirements. Risk is no longer tied to prompts or the model alone. It shows up in what agents do once they are connected to critical systems - coming from permissions they inherit, tools they invoke, and data they move.

Garrett Hamilton & Todd Graham on How AI Agents Change the Way We Think About Security

Garrett Hamilton, CEO and Co-Founder of Reach Security, sits down with Todd Graham, Managing Partner at Microsoft’s venture fund M12, to discuss why modern cybersecurity programs struggle to reduce real risk — despite massive spending on tools. Recorded at Black Hat, the conversation explores how misconfigurations, unused controls, and operational blind spots create exposure long before attackers need advanced techniques.

Why Knowing ATT&CK Isn't Enough: Mapping Real Control Coverage with Reach

Security teams know the attack techniques. What they don’t always know is how those techniques actually land in their environment. Reach maps your existing controls to MITRE ATT&CK (and D3FEND) and shows—visually—︎ which techniques are covered︎ which tools provide that coverage︎ and where real gaps exist Because “we have the tool” isn’t the same as “the technique is stopped.”

How Appknox reporting and analytics make security data usable across teams

Security reporting only works when the right people can use it. Appknox reporting and analytics are designed to help security leaders, AppSec teams, and developers work from the same data—without translation layers or manual fixes—so teams can meet targets for report delivery and act faster.

Expert Roundup -How to Prepare for AI Data Processing Under GDPR?

As AI adoption accelerates across business functions, December’s expert roundup focuses on a question many organizations are now confronting in practice rather than theory: how should companies prepare for AI related data processing under GDPR. Unlike traditional automation, AI systems often rely on large, dynamic datasets, continuous learning, and opaque decision logic.

Why Preserving Data Structure Matters in De-Identification APIs

When it comes to data masking or de-identification, one often-overlooked detail is the importance of preserving the original data structure. While it might seem harmless to normalize extra spaces or convert unique newline characters into a standard format, these subtle changes can actually have a significant impact on downstream processing. Let’s explore why this matters, with a couple of concrete examples.

The Hidden Costs of Building Your Own Data Masking tool

Building an in-house data masking tool often starts as a practical decision. The logic feels sound. Your team understands the data, knows the systems, and can tailor masking logic exactly to your needs. On the surface, it looks like a short engineering project that saves licensing costs and avoids external dependencies. What we’ve learned, after observing many organizations take this path, is that the hidden costs of building your own data masking solution rarely appear during the initial build.

How to Deliver Personalized Content Using IP Geolocation API

An intuitive grasp of customer needs is one of the most garish and trendy components of marketing excellence. Forward-thinking companies are proactively integrating next-gen platforms and tools. A prominent example of this trend is the adoption of IP geolocation services-a logical choice given today's market demands. McKinsey studies show that more than 70% of users are deterred by non-personalized content, which makes them feel frustrated. With a Geo API, you'll build a harmonious and credible connection with your audience through giving them context-aware content exactly when it matters most.