Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Reshaping IGA for the Modern Enterprise: Welcome Zilla Security to CyberArk

This week, we announced an important development in our journey to deliver the industry’s most powerful, comprehensive identity security platform. CyberArk has acquired Zilla Security, a leader in modern Identity Governance and Administration (IGA) solutions, bringing their cutting-edge, AI-powered technology into the fold of our industry-leading platform.

Artificial Intelligence Security Posture Management (AISPM): An Explainer

As AI Agents continue to revolutionize everything about how business is done, ensuring the security of these agents has become paramount. While organizations have rushed to adopt DLP processes and whitelist/blacklist policies to block the use of malicious prompts, it’s worth noting that DLP and firewalls have been around for a very long time and have proven limited in mitigating the risks of users copy/pasting sensitive information onto the internet.

Sensitive Data Leaks from AI Model Use | The 443 Podcast

How are you using ChatGPT at work? On this week's episode of, Corey Nachreiner and Marc Laliberte dig into a report on sensitive data leakage caused by AI model use. They also cover a recent report that highlights a drop in ransomware payments in 2024, as well as a recent attack targeting ASP.NET web servers.

The Dangers of Rushing into AI Adoption: Lessons from DeepSeek

As organizations race to adopt the latest advancements in artificial intelligence, DeepSeek serves as a cautionary tale about the potential dangers of rushing into the hype cycle without adequate consideration of security and ethical implications. DeepSeek, a Chinese AI startup, has been identified as having several significant security risks and vulnerabilities that could pose threats to both the company and its users.

CrowdStrike Leads Agentic AI Innovation in Cybersecurity with Charlotte AI Detection Triage

AI has become both a powerful ally and a formidable weapon in today’s cybersecurity landscape. While AI enables security teams to detect and neutralize threats with unmatched speed and precision, adversaries are equally quick to exploit its potential with increasingly sophisticated and automated attacks. This duality has created an arms race in which organizations must not only adopt AI but continually innovate to stay ahead.

7 Questions Tech Buyers Should Ask About How Their Vendors Use AI

As AI becomes an increasingly critical component in the digital supply chain, tech buyers are struggling to appropriately measure and manage their AI risk. Keeping tabs on emerging risk from the AI technology they use is hard enough. But often the most crucial AI business functions that organizations depend upon aren’t directly under their control or care, but instead are governed by the tech vendors that embed them into their underlying software.

What You Need to Know about the DeepSeek Data Breach

DeepSeek, founded by Liang Wenfeng, is an AI development firm located in Hangzhou, China. The company focuses on developing open source Large Language Models (LLMs) and specializes in data analytics and machine learning. DeepSeek gained global recognition in January 2025 with the release of its R1 reasoning model rivalling OpenAI's o1 model in performance but at a substantially lower cost.