Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Exposing Insider Threats through Data Protection, Identity, and HR Context

Insider threats pose a growing risk to organizations. Whether insiders take malicious actions, exhibit negligent behavior, or make accidental errors, they have the potential to cause significant harm to an organization’s assets, sensitive data, and reputation. Insiders can pose a variety of risks, from stealing confidential data and intellectual property to disrupting systems.

AI Priced by Productivity, Not Promises

Security operations teams are facing a structural problem that tools alone cannot solve. Alert volumes continue to rise. Telemetry is fragmented across cloud, SaaS, identity, and endpoint environments. Experienced analysts are stretched thin, and hiring additional talent has become increasingly difficult. At the Same time, boards are demanding faster response, stronger governance, and clear proof that security investments are delivering measurable value. AI is often presented as the answer.

Sam the AI SOC Analyst: How a Modern SOC Works When the AI is the Conductor

Security operations have never been more complex. Analysts face more alerts, more tools, and more pressure to make the right decision at the right moment. The work feels less like running a security program and more like trying to keep an orchestra in sync while each musician plays from a different sheet of music. This is the challenge Sam was created to solve. Sam, the Securonix AI SOC Analyst, acts like a skilled conductor guiding a symphony.

How Smarter Security Economics Reduce Risk Without Breaking the SOC Budget

Most people don’t manage their personal finances by spending every dollar the same way. You don’t pay rent, groceries, retirement savings, and entertainment out of one undifferentiated bucket. You allocate intentionally covering daily necessities, protecting the future, and investing in things that improve quality of life. Yet that’s exactly how traditional SIEM pricing works. Every log costs the same. Every gigabyte is treated equally.

Rethinking data governance and global compliance

Across Europe and beyond, regulatory frameworks are reshaping how and where organizations manage data. These laws establish enforceable standards for data sovereignty, data governance, and data privacy that directly influence cloud architecture, security strategy, and AI innovation. Without these regulations, you run the risk of these organizational consequences: Data management shouldn’t be considered as only a task for IT. It’s a board-level priority.

Access control in cybersecurity

Access control defines who can access data and systems across an IT environment and under what conditions. Common models include DAC, MAC, RBAC, and ABAC, each supporting different governance and risk requirements. Strong access control depends on MFA, least-privilege enforcement, continuous audits, and clear visibility into sensitive data.

EP25 - Identity is the attack vector w/ Udi Mokady

CyberArk founder and executive chairman Udi Mokady returns to Security Matters at a transformational moment—now as part of Palo Alto Networks, following the acquisition’s close on February 11. In this far‑reaching conversation, Udi and host David Puner explore why identity has become the attack vector for modern enterprises, driven by an unprecedented surge in human, machine and AI‑powered identities that attackers increasingly exploit.

How Passkey Management Works in Keeper

Keeper’s passkey management works by letting you create, store and use passkeys directly from your Keeper Vault so you can sign in with biometric or device-based authentication instead of traditional passwords. By removing shared secrets and replacing them with cryptographic credentials tied to your device, Keeper makes signing in faster, more secure and resistant to phishing attacks.

Is Google Drive Safe for Your Private Files?

Google Drive is the most popular cloud storage solution in the market with over 2 billion users worldwide. Despite this, due to recent concerns and more interest in online privacy, more people are asking is Google Drive safe for their files, photos, and videos. Of course, Google Drive and Google One offer advanced security and privacy features, but it falls short in privacy.