Cybersecurity Insights with Contrast CISO David Lindner | 06/06/25

Cybersecurity Insights with Contrast CISO David Lindner | 06/06/25

Insight No. 1 — Fixing threat actor names Microsoft and CrowdStrike announced that they’ll work together on the headache of multiple  names for the same threat actors. But what matters most is ...
Palo Alto Networks to Acquire Protect AI, Launches AI Security Platform

Palo Alto Networks to Acquire Protect AI, Launches AI Security Platform

Palo Alto Networks Inc. has agreed to acquire cybersecurity startup Protect AI, and it launched a new AI security platform ...
Security Boulevard
file data, anomaly detection, data exfiltration, threat, inside-out, breach, security strategy, data breaches, data search, Exabeam, data, data breaches, clinical trials, breach, breaches, data, residency, sovereignty, data, breaches, data breaches, NetApp data broker FTC location data

Anomaly Detection at Scale: Machine Learning Approaches for Enterprise Data Monitoring

Anomaly detection involves methods that assist in identifying data points or occurrences that differ from the anticipated behavior patterns ...
Security Boulevard
AI, Agents, agentic ai, security, Qevlar, funding,

Qevlar Raises $14M to Lead the Agentic AI Revolution

Qevlar leads the agentic AI revolution and raises $14 million in total funding, including a fresh $10 million round led by EQT Ventures and Forgepoint Capital International ...
Security Boulevard
network, HPE, HPE aruba, users, security, AIOps, BGP internet traffic network routing White House

AIOps Delivers Best Practice Security and Performance to the Network and Business

By implementing an AIOps tool, organizations can adhere to best practices in network management and security, ensuring efficient operations and a robust security posture.   ...
Security Boulevard

AIs as Trusted Third Parties

This is a truly fascinating paper: “Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.” The basic idea is that AIs can act as trusted third parties: Abstract: ...
Single Sign-On (SSO) Differentiation Between Human and Autonomous Non-Human Identities

Single Sign-On (SSO) Differentiation Between Human and Autonomous Non-Human Identities

This in-depth research investigates Single Sign-On (SSO) and its application to both human users and non-human identities. Learn about the necessary differentiations for robust security and effective access management in diverse digital ...

Celebrating our 2024 open-source contributions

While Trail of Bits is known for developing security tools like Slither, Medusa, and Fickling, our engineering efforts extend far beyond our own projects. Throughout 2024, our team has been deeply engaged ...