Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

CrowdStrike 2026 Global Threat Report: The Evasive Adversary Wields AI

As cyber defenses become stronger, adversaries continue to evolve their tactics to succeed. In 2025, the year of the evasive adversary, the threat landscape was defined by attacks that targeted trusted relationships, demonstrated fluency with AI tools, and incorporated tradecraft tailored to exploit security blind spots.

OAuth security guide: Flows, vulnerabilities and best practices

OAuth is a commonly used authorisation framework, that allows websites and web applications to request limited access to a user’s account on another application. Users can grant this limited access to their account, without ever needing to expose their password with the requesting website or application. This is commonly seen with sites that allow you to log in with popular accounts such as a social media login, Microsoft or Google account.

AI isn't replacing SOC teams. It's elevating them.

AI has radically transformed the way SOC teams operate, but how is it affecting the people behind the work? For our recent Voice of Security 2026 report, we surveyed over 1,800 global security professionals to find out. We wanted to understand not only AI’s impact on security careers, but how teams really feel about these shifts. The results show that despite rising workloads and widespread burnout across security teams, sentiment toward AI is largely positive.

Endpoint AI Agents Don't Ask Permission. For Better or Worse, They Operate Like Employees

The next major security problem enterprises will face won’t originate in the cloud. It will emerge on endpoints, where agentic AI is already operating with autonomy, authority, and access to sensitive data.

The Surprising Automotive Roots of Modern Combine Harvester Technology

Where do combine harvesters get their brains from? It feels like combine technology has always been developed in-house by the various manufacturers we see today. But the truth is...many of the critical systems that run your combine harvester actually come from the automotive industry. GPS guidance systems, hydraulic components, electronic sensors...the list goes on. Plus the artificial intelligence that drives the insane automation you see in some of the newer models. Automotive technology paved the way for today's high-tech ag machinery.

Why Most Companies Don't Catch Internal Threats Until It's Too Late

Every year, businesses lose billions to threats that don't come from hackers on the other side of the world. They come from inside the building. Whether it's financial misconduct, data theft, or simple policy violations that snowball into costly incidents, internal threats are consistently one of the hardest risks to detect and manage.

Tigera: The Hidden Cost of DIY Kubernetes Networking

Building your own networking stack using separate open-source tools might seem like a flexible choice, but it creates a hidden "Integration Tax". The real cost isn't buying the tools-it is making them work together. In this webinar, we will break down why DIY networking is more expensive than it looks and why these problems get worse as you grow. We will cover the four main friction points: Join us to learn why the coordination cost of DIY networking eventually outweighs the benefits and how to fix it.

Tigera: Calico AI: Accelerating Kubernetes Troubleshooting and Network Policy Management

Debugging obscure Kubernetes networking issues often turns platform engineers into a reactive "complaint department," consuming significant time that could be spent on innovation. Instead of manually sifting through complex configuration files to resolve connectivity issues, teams need automated tools to quickly identify root causes. This demo shows how Calico AI simplifies operations by automating troubleshooting and policy creation, reducing the operational toil associated with managing Kubernetes networking.

Tigera: Calico Egress Gateway: Assigning Static IPs to Dynamic Kubernetes Workloads

Connecting ephemeral Kubernetes pods to external resources (databases, APIs) protected by traditional firewalls is a known infrastructure challenge. Because pod IPs change frequently, security teams often refuse to update firewall rules dynamically or to allowlist the entire cluster CIDR because of risk. This demo shows how to use Calico Egress Gateway to route traffic from specific namespaces or pods through a stable, static source IP, enabling integration with external firewalls without compromising security.