Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Next Security Frontier: AI Agents, MCP, and the Coming API Wave

I’ve seen this story before, and I’m seeing it again. When we founded Salt Security in 2016, APIs already powered the digital economy, Kubernetes started to accelerate the growth of APIs, yet almost nobody was monitoring them. Visibility was near zero, context was missing, and protection was an afterthought. Fast-forward to 2025, and the same blind spot is forming, only bigger. AI agents are no longer just generating content; they are also creating it.

17 Common Indicators of Compromise

On a sunny summer vacation day, your childhood self is running around a playground looking everywhere for a small piece of paper as part of a treasure hunt. Each clue you find leads to another, then another, until you finally locate the hidden treasure. Investigating a security incident is similar to this process, but instead of clues written on paper, your clues are digital artifacts that attackers left in your systems. These digital artifacts are called indicators of compromise (IoCs).

Identity security at inception: A CISO's guide to proactive protection

Modern enterprises are facing an identity explosion. Fueled by cloud adoption, DevOps acceleration, and now agentic AI, the number of human and machine identities is growing faster than most organizations can manage. According to the CyberArk 2025 Identity Security Landscape, 9 out of 10 organizations report a successful identity-centric breach, with relentless and sophisticated bad actors continuing to target identities. Machine identities now outnumber human identities by an astonishing 82:1.

Zero Trust Isn't Enough: Here's How to Validate It and Prove Resilience

Authors: Tova Dvorin, Senior Product Marketing Manager | Adrian Culley, Senior Sales Engineer You’ve implemented Zero Trust. You’ve rolled out segmentation, multi-factor authentication (MFA), and policy enforcement. Your dashboards are full. But when the Board asks: —you hesitate. You’re not alone.

Granular Recovery Technology in Kubernetes and OpenShift

Kubernetes disasters require precision recovery solutions, not full system restorations that waste valuable time. Granular recovery technology allows IT teams to extract and restore specific files, objects, or application components from backups while leaving everything else intact. Taking a targeted approach reduces downtime from hours to minutes for organizations running critical workloads on Kubernetes and OpenShift platforms.

Empowering Telco Cloud Transformation with SUSE and Trilio

Telecommunication providers are rapidly embracing technologies like 5G, edge computing, Open RAN, and AI-driven automation. Yet, as innovation accelerates, data protection remains a crucial concern. The adoption of cloud-native architectures—especially Kubernetes—demands modern solutions that ensure data resilience, scalability, and operational continuity.

Understanding Attack Surfaces: What They Are and Why They Matter

In today’s digital environments, where cloud infrastructure, remote work, and third-party tools are the norm, the number of ways attackers can reach your systems are infinite. These potential entry points make up your attack surface. Understanding it is the first step toward defending it. As companies adopt more cloud services, mobile endpoints, and third-party apps, attack surfaces continue to grow — making visibility and management more critical than ever.

9 Key Fators to Consider When Choosing a PAM Solution

Choosing a privileged access management (PAM) solution isn’t just a technical decision — it’s a strategic one. Selecting the right PAM platform is essential for securing your IT infrastructure, ensuring audit readiness, and minimizing business risks. But with so many tools claiming to offer comprehensive protection, how do you separate the truly effective ones from the rest? This article breaks down the nine most important factors to consider when choosing a PAM solution.

Navigating DORA: Key Considerations for the Financial Sector

It is no secret that the financial industry is a serious target for cyber criminals, driving the need for more stringent regulations to help protect these institutions and their employee and customer data. Recent research undertaken by Security Scorecard indicates that in 2023, 78% of European financial institutions experienced a data breach involving a third party. Also, 84% of financial organisations have been affected by a breach involving a fourth party.