Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Reflections from the AI Agent Security Summit in San Francisco

Last week, I had the honor of emceeing the AI Agent Security Summit in San Francisco, a gathering of some of the brightest minds exploring the intersection of artificial intelligence, security, and human responsibility. Having moderated a panel at the first Summit in New York City earlier this year, stepping into the emcee role this time around was a different experience, but just as enjoyable. On-demand recordings of the sessions will be available soon.

The F5 BIG-IP Source Code Breach

On August 9, F5 discovered that multiple systems were compromised by what it is calling a "highly sophisticated nation-state threat actor" who maintained "long-term, persistent access to certain F5 systems". These included the BIG-IP product development environment and engineering knowledge management platform. That access allowed for the exfiltration of portions of F5's BIG-IP source code as well as information about undisclosed BIG-IP vulnerabilities F5 was working on.

How to demonstrate your AI security posture: A step-by-step guide

As organizations integrate AI into their everyday systems and operations, the scrutiny on the risks it introduces is higher than ever. According to Vanta’s State of Trust Report 2024, more than half of organizations express concerns over security risks compounded by AI. ‍ The growing unease highlights a new business expectation: you must be able to prove your organization is using AI securely and responsibly.

CJIS Security Policy compliance: An extensive guide

The Criminal Justice Information Services Division (CJIS) within the FBI manages Criminal Justice Information (CJI). Considering the highly sensitive nature of law enforcement data, you have to implement federal security standards to safeguard CJI against increasingly complex cybersecurity threats. ‍ The CJIS Security Policy was introduced in 1992 as a framework to protect CJI through both strategic and tactical measures.

PCI DSS Compliance for E-Commerce: How to Secure and Monitor Payment Pages

Modern checkout pages have evolved from static forms into dynamic ecosystems where dozens of third-party scripts run alongside first-party code. This complexity expands the attack surface and challenges traditional defenses designed for fixed perimeters. PCI DSS 6.4.3 was introduced to address that shift, emphasizing continuous oversight of browser-executed scripts and the integrity of client-side behavior.

PhishinGit - GitHub.io pages abused for malware distribution

This blog discusses PhishinGit, a phishing campaign uncovered by CYJAX that abuses GitHub.io pages to distribute malware disguised as Adobe downloads. It explains how threat actors used Browser-in-the-Browser (BitB) techniques, Dropbox-hosted payloads, and anti-analysis JavaScript to evade detection. The blog also explores the attack chain, observed mitigations, MITRE ATT&CK mapping, and indicators of compromise (IOCs) to help organisations identify and defend against similar threats.

Ready or Not?? New 11:11 Ransomware Report

The statistics in our Ransomware Report are sobering: ransomware attacks occur roughly every 11 seconds, with 85% of organizations suffering at least one attack within a 12-month period. For IT professionals managing critical infrastructure, the question isn’t if you’ll face a cyber incident—it’s when. The numbers are staggering: cybercrime damages are projected to reach $23 trillion annually by 2027.

Why VM Backups Are Not Enough in Tanzu

Running Kubernetes on VMware Tanzu gives you flexibility, scalability, and strong enterprise integration. But when it comes to protecting applications and data, many teams still rely on traditional VM backups. At first glance, it seems logical: if you back up the VM that hosts your cluster, you should be safe. Unfortunately, that’s a dangerous assumption. VM backups capture the virtual machine state—but they don’t understand Kubernetes.

ISO 27001 Audit Record Retention Requirements

As one of the most common information security frameworks in the world, ISO 27001 is used by tens of thousands of organizations worldwide. That means it has to fit a lot of different groups with a lot of different needs. It also means that there’s a lot of information pertaining to ISO 27001 within each of those companies. Data like the logs of access control systems, the chain of custody for sensitive information, and the results of audits are all stored somewhere.

Netwrix Innovation Week: Copilot Readiness - Prepare your Hybrid Data Estate to Unleash AI

Microsoft 365 Copilot can supercharge productivity, but without guardrails it can also surface sensitive data to the wrong people. Risks like oversharing, excessive permissions, and compliance blind spots become amplified in the age of AI. Netwrix helps organizations prepare for safe adoption by uniting data and identity security. Watch our podcast episode to learn how to build real Copilot readiness.