Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Browsers: A Security Nightmare Flipping the Board on Decades of Security Progress

Modern browsers are among the most hardened mass consumer applications that we have access to. Decades of work have produced strict isolation between sites, safer defaults for cookies, strong TLS enforcement, controlled permissions, and a user experience that steers people away from phishing and fraud. The result is a trustworthy gatekeeper that keeps untrusted sites and attacker payloads confined to their own sandboxes.

When Screenshots, Clipboard Activity, & File Uploads Become Security Incidents: Lessons from a Recent Insider Threat Case

A leading cybersecurity vendor recently terminated an employee who took internal screenshots and shared them with threat actors, who then attempted to pass off the leaked material as evidence of a system breach. While no customer data was compromised and production systems remained secure, the incident exposed a blind spot that should concern every CISO: authorized users with legitimate access becoming your biggest vulnerability.

CrowdStrike Leverages NVIDIA Nemotron in Amazon Bedrock to Advance Agentic Security

Adversaries are increasingly adopting AI technology to make their cyber operations faster, more efficient, and harder to detect. To stay ahead, defenders need intelligent systems capable of reasoning and acting with the same speed and accuracy as the adversary. CrowdStrike empowers defenders with the CrowdStrike Falcon platform, our agentic security platform that is fueled by AI built and governed by experts who understand the mission of defense.

How to Get UL 2900 Penetration Testing Service

UL 2900 is a cybersecurity standard used for networked products and systems. This certification framework is part of the response to the growing security challenges posed by connected devices across various sectors. It defines testing guidelines, security requirements, and continuous maintenance steps, enabling manufacturers to create secure products from the outset. UL 2900 penetration testing and certification is much more than foundational compliance.

New Report Reveals Third-Party Risk Management's Next Chapter

After six years of tracking third-party risk management programs (TPRM), one thing has become clear: having a program doesn't necessarily mean it's working. Our latest The State of Supply Chain Defense report reveals an interesting shift. Organizations are spending more than ever on securing their vendor ecosystem, with 95% planning to increase their budgets in the next year. Programs are maturing, with nearly half of surveyed organizations reporting established and optimized initiatives.

Building Data Sovereign Clouds: The Imperative of Digital Sovereignty, Operational Resiliency and Data Protection

In today’s geopolitical and regulatory climate, organizations and nations are increasingly embracing digital sovereignty—the ability to control and protect their data, infrastructure and operations within defined jurisdictions. The sovereign-cloud market is growing fast as governments and regulated enterprises demand local control, auditable supply-chains, and cloud-native resiliency.

3 takeaways from the 2025 EDUCAUSE annual conference

This year's EDUCAUSE brought together leaders from IT, security, enrollment, and student services. The theme, “Restoring Trust,” reflects the challenges that higher education institutions and professionals are facing. Fraudsters are using new tools and techniques to target faculty and students. Whether they’re trying to gain access to sensitive information or steal student aid, the potential danger is real.

TLS certificate management in 2026: The endless game of Whack-A-Cert

As 2025 races to a close, you’ll see several predictions about AI agents, quantum computing, and other frontier innovations. Don’t get me wrong, I’m excited about solving these challenges, too. But there’s a quieter, less flashy countdown underway, one that will determine whether organizations can even reach the cutting edge. TLS certificates—the machine identities used to prove machines are who they say they are—will begin expiring twice as fast in March 2026.

Making DORA Strategy Practical: What Cybersecurity Leaders Need to Succeed in 2026

For many cybersecurity teams, the race to comply with the Digital Operational Resilience Act (DORA) is well underway, but clarity and confidence remain elusive. With enforcement set to take effect in January 2026, the countdown is on for financial institutions and their ICT providers to prove that they can withstand and recover from digital disruptions. The regulation sets high expectations for cross-functional coordination, ICT risk oversight, third-party accountability, and real-time monitoring.