Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Enable SSO into Shopify Admin & Add Unlimited Staff Members

Enable secure Single Sign-On (SSO) access to your Staff Members and add an unlimited number of staff members in Shopify Admin to manage your Shopify Store. You can completely own your Shopify Store by restricting your staff member’s access based on tags assigned to them. Login from multiple IDPs is also supported which will help in authenticating users from different IDPs for your Plus & Non-plus Shopify Store.

An AI Agent Didn't Hack McKinsey. Its Exposed APIs Did.

This week’s McKinsey incident should be a wake-up call for every enterprise moving fast to deploy AI. Not because AI itself is inherently insecure. But because too many organizations are still thinking about AI security at the model layer, while the real enterprise risk sits in the action layer: the APIs, MCP servers, internal services, and shadow integrations that AI agents can reach, invoke, and manipulate. That is the part most companies still do not see.

Establish a New Foundation by Rethinking Your File Server Strategy

In case you missed it, Egnyte recently presented a webinar focused on an ongoing yet potentially overlooked problem for many organizations—their file server strategy. Our discussion covered a ton of ground, but I thought it was important to recap some of the takeaways and recommended next steps here.

The Stryker Cyberattack: Why Endpoint and Mobile Device Monitoring Matter

Recent reports of a cyberattack targeting medical device manufacturer Stryker highlight a growing challenge for modern organizations: maintaining visibility across every device connected to their networks. The Michigan-based healthcare technology company reported a global network disruption affecting its Microsoft environment following a cyberattack.

Managed Detection and Response Solutions: Strengthening Security with LevelBlue MXDR

LevelBlue has developed a suite of managed detection and response solutions to help organizations maintain strong security as threat groups grow more sophisticated. LevelBlue’s Managed Extended Detection and Response (MXDR) with a Co-Managed Security Operations Center (SOC) combines MDR security technology with collaborative expertise to help organizations monitor, investigate, and respond to threats across their environments.

Proving Zero Trust in Practice: Continuous Validation for Segmentation and Lateral Movement Defense

SafeBreach Senior Product Marketing Manager Tova Dvorin explores the critical necessity of continuous validation in Zero Trust architectures, specifically focusing on the integration of SafeBreach and Akamai Guardicore. While microsegmentation is a foundational element in the defense against lateral movement and ransomware propagation, dynamic infrastructure and policy drift often create “blind spots” that compromise security posture.

Basic Authentication vs. Modern Authentication and How to Enable It in Office 365

According to a Verizon report, the majority of data breaches are made possible by compromised credentials, especially on email servers. Social engineering, credential phishing and brute force attacks are some of the methods used by malicious actors to steal credentials. To improve the security of Office logins and help prevent data breaches, Microsoft introduced the modern authentication method.

Why Soft Guardrails Get Us Hacked: The Case for Hard Boundaries in Agentic AI

One recurring theme in my research and writing on agentic AI security has been the distinction between soft guardrails and hard boundaries. As someone who serves on the Distinguished Review Board for the OWASP Agentic Top 10, and who spends every day thinking about how to secure agents across enterprise environments at Zenity, this distinction is not academic. It is potentially the single most important conceptual framework practitioners need to internalize right now.

How Governments Use AI Safely | AI Governance Explained

How are governments using AI while protecting citizens’ data and privacy? In this episode of AI on the Edge, Ciara Maerowitz, Chief Privacy Officer for the City of Phoenix, explains how cities implement AI governance, manage bias, ensure transparency, and assess AI risks. Learn how responsible AI frameworks, policies, and risk management help governments safely adopt artificial intelligence.