Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How likely is a man-in-the-middle attack?

Security vendors love the man-in-the-middle attack. It’s the boogeyman of every TLS marketing page. Some shadowy figure intercepting your traffic, reading your secrets, stealing your data. A man-in-the-middle attack is when an attacker positions themselves between two parties on a network to intercept the traffic flowing between them. In the context of TLS, that means an attacker who can present a valid certificate can read everything in plaintext and proxy it on to the real server.

Claude Code Security: A Welcome Evolution in the Remediation Loop

AI accelerates discovery — but enterprise trust still depends on deterministic validation, remediation automation, and governance at scale. Last Friday, Anthropic launched Claude Code Security, powered by Opus 4.6, inside Claude Code. The demo is impressive: Frontier AI reasoning scanned open source codebases and surfaced over 500 previously unknown high-severity vulnerabilities — including subtle heap buffer overflows that had survived decades of expert review and fuzzing.

Securing Every Layer: How LevelBlue's Full-Stack Testing Protects Your Product and Reputation

Connected products, whether IoT, IIoT, embedded, mobile, or other such devices, serve to either strengthen or undermine an organization’s security posture and reputation. As device ecosystems grow in complexity, manufacturers must secure embedded hardware, firmware, over-the-air (OTA) update mechanisms, companion mobile applications, cloud services and APIs, and RF interfaces. Each layer introduces distinct attack surfaces that adversaries actively target.

From Prompt to Production: The New AI Software Supply Chain Security

Listen to a NotebookLM podcast version of the blog: When Anthropic announced Claude Code’s new security scanning capabilities, following the announcement of OpenAI’s Aardvark, it marked an important moment for the industry. For the first time, expert-level security review is becoming embedded directly into the act of writing code. Subtle, context-dependent vulnerabilities can now be flagged as they are created. Zero-days can potentially be remediated before they ever make it into a build.

Why Your SOC is Blind to Your Biggest Attack Surface (And How to Fix It)

In many organizations, there is a dangerous unspoken rule: The SOC handles endpoints and networks; Engineering handles APIs. This silo creates a massive blind spot. We recently spoke with the Senior Manager of Security Engineering at a major insurance provider, who described this exact pain point.

Xona Platform v5.5 is Now Available

TL;DR Xona Platform v5.5 strengthens remote access across distributed OT environments. It introduces session resilience to maintain continuity during network interruptions, expands centralized governance for more consistent access control, and enhances support for constrained or disconnected deployments. In critical infrastructure environments, remote access is not abstract. It supports maintenance windows, emergency response, vendor coordination, and day-to-day operations across distributed sites.

1Password becomes the first global partner to transact through Express Private Offers in AWS Marketplace

1Password has achieved a significant milestone in our collaboration with Amazon Web Services (AWS): We are officially the first partner globally to successfully transact through express private offers on AWS Marketplace, a new AI-driven capability that automates personalized pricing, allowing teams to bypass manual negotiations and receive a tailored quote in minutes.

How to Get Your Board to Care About Security (Before a Breach Forces the Issue)

If you’ve ever read one of those “Board Reporting Templates for CISOs” articles and thought, “Ah yes, surely my board will dedicate 25 minutes to my posture dashboard and ask follow-up questions about vulnerability backlog burn-down velocity,” then I have wonderful news for you: You have not met enough boards. Most enterprise boards don’t want a security dashboard. They don’t want posture metrics.

What is Data Loss Prevention (DLP)?

Data Loss Prevention (DLP), also called data leakage protection, is a cybersecurity approach designed to detect, prevent, and manage unauthorized access, sharing, or transfer of sensitive information. In simple terms, DLP helps organizations keep control of critical data such as personally identifiable information (PII), financial records, credentials, and intellectual property (IP).

Difference between Network DLP vs Endpoint DLP vs Cloud DLP

When it comes to protecting business-sensitive data, understanding the difference and the scope of Network DLP, Endpoint DLP, and Cloud DLP is essential. Each of these Data Loss Prevention solutions (DLP) plays a unique role in securing data across various environments, whether it is on the Network, on individual devices, or in the Cloud. Knowing how each solution works can help you determine the best approach to safeguard your organization's sensitive information.