Data Security
How Free Are Your NHIs from Cyber Threats?
How Secure Are Your Non-Human Identities From Cyber Threats? Are you confident that your non-human identities (NHIs) are free from cyber threats? If your initial reaction is uncertainty or hesitation, don’t worry, ...

When AI Fights Back: Threats, Ethics, and Safety Concerns
In this episode, we explore an incident where Anthropic’s AI, Claude, didn’t just resist shutdown but allegedly blackmailed its engineers. Is this a glitch or the beginning of an AI uprising? Along ...
Keep Your Cloud Environments Safe with NHIs
Why is NHI Protection Crucial for Maintaining Safe Cloud Environments? How crucial is the management of Non-Human Identities (NHIs) and secrets for maintaining a safe cloud environment? The answer lies in the ...
Your Assurance in Securing NHIs Properly
Are You Harnessing the Full Potential of Secure NHIs? Organizations require robust security measures to safeguard their digital assets. An often overlooked yet critical element of these measures is the management of ...

U.S. Authorities Seize DanaBot Malware Operation, Indict 16
U.S. authorities seized the infrastructure of the DanaBot malware and charged 16 people in an action that is part of the larger Operation Endgame, a multinational initiative launched last year to disrupt ...
Optimistic Security: A New Era for Cyber Defense
Why Optimistic Cybersecurity? Ever wondered how evolving technology could help fortify your entity against cyber threats? Well, this might be the perfect time to introduce the concept of Optimistic Cybersecurity, an innovative ...

Law Enforcement, Microsoft Disrupt Operations of Popular Lumma Stealer
International law enforcement agencies and cybersecurity vendors seized thousands of domains used to run the MaaS operations of the widely popular Lumma Stealer malware, which was used to facilitate ransomware, malvertising, and ...

Top Indicators You Have a Cybersecurity Problem—and What to Do About It
Data is both blessing and curse to the modern enterprise. Yes, when analyzed effectively it can surface intelligence to improve decision making, customer engagement, process efficiency and, ultimately, drive revenue. But it ...
Gaining Certainty in Uncertain Security Landscapes
Why is Security Certainty a Necessity in Today’s Cybersecurity Landscape? Where data breaches are increasing at an alarming rate, maintaining cybersecurity certainty has become a daunting task. But what if you could ...

The OWASP LLM Top 10 and Sonatype: Data and model poisoning
Artificial intelligence (AI) continues to redefine what is possible in software, from predictive models to generative content. But as AI systems grow in power, so too do the threats targeting their foundations, ...