Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is AI Data Exfiltration and How Do You Stop It?

AI adoption does not happen uniformly across an organization. Some employees have integrated generative AI (genAI) tools into core parts of their workflow. Others have barely opened one. Most are somewhere in between, experimenting on an ad hoc basis, without consistent visibility into what data those tools handle or where it goes. That variance is the problem. Security programs built around either universal AI adoption or zero AI adoption will miss most of the actual risk.

Using Agentic AI to Scale Threat Detection in Healthcare

For every human in a healthcare organization, there are 82 machine identities—service accounts, API keys, cloud functions, medical devices.2 That's the 82:1 ratio, and it means your team is fundamentally outnumbered. The Change Healthcare breach in 2024, which started with one unprotected Citrix credential and disrupted 40% of US claims processing,1 showed exactly what happens when that ratio goes unmanaged. The numbers back this up.

The Claude Code Leak

On March 31, 2026, a routine npm publish turned into pure chaos. A 59.8 MB JavaScript source map file meant for internal debugging was pushed along inside the Claude code package version 2.1.88. A researcher, Chaofan Shou (@Fried_rice), yanked that file within hours and publicly disclosed the Claude code Leak on X. Within the next few hours, the whole internet’s nerds had mirrored, de-obfuscated, and gone through more than 513,000 lines of TypeScript across 2000+ files.
Featured Post

Solving the Leadership Paradox to Avoid a Cybersecurity AI Skills Generation Gap

Transforming operations to embrace artificial intelligence (AI) is the leading challenge for organisations in every sector right now. Arguably, urgency is even greater in the technology sector, where leaders are acutely aware of AI's potential to boost productivity and efficiency. In the cybersecurity subset of technology, the drive is stronger still, as vendors seek to mitigate AI-accelerated cyberattacks and help customers react faster, protect better, and achieve more with the limited budgets that characterise today's economy.

The Floor Was Selling AI. The Hallways Were Asking for Help.

One man’s perspective on RSA 2026 and what the AI agent security market actually looks like up close. Every year at RSA, there's a theme, not the official one printed on the lanyards, but the real one. The one that shows up in every booth conversation, every hallway argument, every dinner where people finally say what they wouldn't say on a panel. A few years back, it was cloud. Then zero trust took over and held the room for a while. XDR came through and confused everyone. Identity had its moment.

AI Models Won't Pick Sides in the Security War. Governance and Policy Will.

Two significant software supply chain cybersecurity attacks, seven days apart, with one hundred and eighty million weekly downloads between them. The chaos from development teams to the boardroom is real. And the pace is only going to get faster. Much, much faster…

AI With Intention: Visibility Drives Action: Strengthening Cyber Risk Management with Better Data

As organizations shift to cloud services and third-party vendors, maintaining visibility and control over cyber risk has become increasingly complex. In this video, we explore one of the biggest challenges facing security leaders today: how to manage cyber risk without full visibility into your environment. Learn why visibility is critical to effective cybersecurity—and how the right data enables organizations to.

CMMC Requirements for AI Systems: What Assessors Actually Look For

Josh Rector is the Compliance Director, Public Sector at Ace of Cloud, a security and compliance consulting firm, certified CMMC Third-Party Assessor Organization (C3PAO), and Registered Provider Organization (RPO). With more than a decade of experience in cybersecurity compliance, he has worked both sides of the assessment table, leading internal and external assessments, serving as ISSO for systems at federal agencies, and guiding cloud service providers through the FedRAMP authorization process.

Scaling Reach Security the Right Way

New year, new faces, big goals. To close out 2025 and open 2026, we welcomed 43 new team members across engineering, sales, customer success & solutions, marketing, and operations. Reach was founded to close the gap between knowing where you're exposed and actually fixing it. That mission doesn’t scale without the right people. Growth is exciting, but aligned growth—with the right people, at the right time, for the right mission—is what really matters.