From golden images to agent governance, Chainguard Assemble 2026 focused on how teams can reduce risk by embedding trust, compliance, and security into delivery systems.
Microsoft 365 E7 launches May 1, 2026. At $99 per user per month, it is the most complete Microsoft enterprise license ever shipped. It bundles E5, Copilot, Entra Suite, and the new Agent 365 into a single SKU. We have fielded hundreds of questions from customers about what E7 means for their security posture, their licensing strategy, and their AI readiness. Here are the 10 questions that come up the most, answered from a security partner perspective.
Today’s partners don’t need more portals, more PDFs, or more one‑time training sessions. They need momentum. That’s why we built Exabeam Sherpa, an AI‑powered, always‑on virtual Channel Account Manager (CAM) designed to help partners ramp faster, sell smarter, and scale performance as their teams grow.
We built 1Password Unified Access to extend identity security beyond humans to the agents and machine workloads operating across your business. In practice, that means securing not just who gets access, but how agentic systems connect to tools, services, and data.
What happens when a $29 billion company forgets to rename a model ID, and what it means for every organization using open-source AI. On March 19, 2025, Cursor, the AI-powered coding tool valued at $29 billion and generating an estimated $2 billion in annual recurring revenue, launched Composer 2, its newest and most powerful coding model.
In AI systems, PII detection is the first step. Not the most glamorous step. But the one that, when it fails, takes everything else down with it. Identifying sensitive data (names, Social Security numbers, financial records, health information) has to happen before any of it reaches an LLM. Get this wrong, and you’re looking at one of two bad outcomes: Traditional DLP systems could afford to be aggressive with detection. LLMs can’t. They depend on full context to generate correct outputs.
Digital Cleanup Day might be seen as a digital chore: delete old files, clear the inbox, reduce your carbon footprint. It’s framed as a technical exercise. But digital cleanup isn't only about your hard drive; it’s also about your mind. We are currently drowning in "Digital Toxicity" vast amounts of redundant, obsolete, and trivial data. This isn't just a storage issue. It’s a security crisis. Why? Because you cannot protect data you don’t remember you have.
My colleague Manoj Nair recently wrote about the growing gap between what AI builds and what security teams actually test. He made the case that the speed of AI-driven development has fundamentally outpaced validation, and that the response can't be to slow down, but to change what testing means. I agree with every word.
One of the core pillars of the security perspective adopted by the Department of Defense is the so-called Zero Trust strategy. This strategy is the adaptation to evolving threats in the world, many of which prey on the presumption of trust from accounts and individuals that can be compromised. To protect controlled unclassified information and other sensitive data, the presumption of zero trust is necessary to eliminate many common threats.
Protecting sensitive data is essential in today’s digital world, where personal information is stored across multiple devices and online accounts. From financial details to login credentials, even small pieces of data can be used by cybercriminals if they fall into the wrong hands. The good news is that you can protect sensitive data with simple, practical steps.