Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Using LLMs to filter out false positives from static code analysis

Static application security testing (SAST) is foundational to modern application and code security programs. Yet these tools inevitably produce false positives that require manual review. When scanners find vulnerabilities that are not genuine issues, they erode trust, slow down remediation, and make it harder for teams to understand which alerts require attention.

Clean IPs are the Foundation of Network Automation Success

Every automation initiative starts with excitement, intent-based networking, AI-driven decisions, and Python scripts promising speed and resilience. But when someone asks, “Do we know what IPs are in use?” silence often follows. If your IP tracking lives in spreadsheets, you’re not alone, but you are vulnerable. Before writing a single script, teams need an authoritative and current IP source of truth.

JFrog & GitHub: Unifying the Software Supply Chain, One Step at a Time... and Our 2025 GitHub Technology Partner Award

Organizations increasingly demand platforms that not only accelerate software delivery but also provide trust, security, and traceability. At JFrog, the software supply chain is managed and secured by default, from commit to runtime. That’s why our deep integration with GitHub is central to how we help teams manage, monitor, and secure every step of software delivery. In this post, we’ll explore.

The Top 10 Endpoint DLP Solutions of 2025 (and 30 FAQs Every Security Team Should Know)

Nightfall delivers the most comprehensive endpoint DLP in 2025 by combining lightweight agents with cloud-native architecture, protecting Windows, Mac, endpoints while uniquely preventing data leaks to AI tools with 95% accuracy.

Making AI Less "Wednesday:" A Practical Guide to Using AI in Cyber Defense

Artificial intelligence has only been available for a relatively short period. Still, already many cyber defenders are as frightened as if Jenna Ortega’s Wednesday Addams had whipped her head around and set her dark, dangerous eyes on them. It’s not hard to see why. Machine learning, Gen AI, and Retrieval-Augmented Generation (RAG) are a few of more than 20 new acronyms flooding our industry, with more being added almost every day.

EP 18 - The humanity of AI agents: Managing trust in the age of agentic AI

In this episode of Security Matters, host David Puner sits down with Yuval Moss, CyberArk’s VP of Solutions for Global Strategic Partners, to explore the fast-evolving world of agentic AI and its impact on enterprise security. From rogue AI agents deleting production databases to the ethical blind spots of autonomous systems, the conversation dives deep into how identity and Zero Trust principles must evolve to keep pace.

Impending Chaos: One in Twenty Small Businesses Will Suffer Financial Loss

The most underserved cyber insurance market is the small and medium-sized businesses, emphasis on the small. There are roughly 33 million small business in the United States, and according to the insurance industry, there are only 4.3 million cyber insurance policies issued to small businesses… So what options do they have?

Keeping the Internet fast and secure: introducing Merkle Tree Certificates

The world is in a race to build its first quantum computer capable of solving practical problems not feasible on even the largest conventional supercomputers. While the quantum computing paradigm promises many benefits, it also threatens the security of the Internet by breaking much of the cryptography we have come to rely on. To mitigate this threat, Cloudflare is helping to migrate the Internet to Post-Quantum (PQ) cryptography.

The Do's & Don'ts of Writing Audit-Proof Risk Assessments

When an auditor walks through your door, they aren't looking for a list of vulnerabilities; they're looking for proof that your Third-Party Cyber Risk Management (TPCRM) program is consistent, defensible, and robust. Internal and external auditors evaluate the Vendor Risk Management process by testing evidence, but they do so with different goals.