Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Operationalize Data Security Automation with Cyera and Torq

Data is the critical foundation for all organizations, powering innovation, decisions, and growth. It’s also the fastest-growing attack surface, with sensitive information scattered across clouds, on-premise servers, and SaaS platforms. Cyera, the leader in modern data security, provides rich visibility into sensitive data down to its DNA level, providing vital context, identifying data risks and vulnerabilities, and delivering SOC teams a clear map of their data attack surface.

Compliance Plus Library Reaches 800 Pieces of Content

It seems like only yesterday that we launched the Compliance Plus training library as a result of customers asking us to address their needs beyond security awareness training. The team and I were just looking at our first few months where we had just over 20,000 customer completions in June of 2021. We have since had millions of users complete our content and the library has grown from 115 pieces of content at launch to over 800 pieces of content.

Top Network Penetration Testing Companies in 2025

Most teams approach network penetration testing the same way: pick a few well-known tools, run automated scans, and call it a day. But in today’s evolving threat landscape, that is a losing strategy. Attackers do not just rely on off-the-shelf exploits but adapt, chain vulnerabilities, and find gaps that automated tools miss. CTOs and engineering leaders need to rethink their approach with respect to context, strategy, and how they integrate into your security workflow.

The state of Falco: A year of progress since CNCF graduation

It’s been just over a year since open source Falco graduated from the Cloud Native Computing Foundation (CNCF) during KubeCon EU 2024, and the momentum hasn’t slowed down. From advancements in real-time threat response and expanded audit event collection across cloud-native environments, to reaching 150 million downloads and even new open-source technologies like Stratoshark being built on Falco’s libraries, the project continues to evolve rapidly.

Sysdig and Camptocamp announce partnership for strong cloud security based on open source

The cloud has become the hub of modern data traffic. It offers organizations of all sizes unprecedented speed, flexibility, and countless collaboration options. However, cybercriminals also know how to exploit the power of the cloud for their own purposes, which is why proven security solutions—and service providers who can implement them quickly and in a customized manner—are in high demand.

Celebrating our 1,000th Library entry - automated resource backup by GE Vernova

At Tines, we're committed to making workflow building as easy and efficient as possible. That’s why we’re so proud of our library, which reached an exciting milestone today when it officially became home to over 1000 pre-built workflows. These pre-built workflows, known to many Tines users as stories, are designed to foster knowledge sharing across the security and IT community, providing inspiration and shortcuts to help users build faster and more effectively.

Announcing Jit's Integration with Bright Security: Dev-Centric DAST Meets Unified Security Prioritization

We’re excited to announce Jit’s new integration with Bright Security, a best-of-breed DAST solution built for developers. This integration brings Bright’s accurate, low-noise security testing into Jit’s unified product security platform—so your AppSec team and developers can manage, prioritize, and remediate vulnerabilities from one centralized backlog. The problem?

12 Best Practices for Banking & Finance Cybersecurity Compliance

Financial data has always been a prime target for cybercriminals due to its high value. Therefore, banks, loan services, credit unions, and investment and brokerage firms are highly vulnerable to cyberattacks. Moreover, security incidents in the financial sector are extremely costly (surpassed only by the healthcare industry), with the average total cost of a data breach reaching $6.08 million in 2024.

Build vs. Buy: What's the Best Threat Intelligence Approach?

Cyber threats are escalating rapidly, with the cost of global cybercrime projected to reach $10.5 trillion annually by 2025, up from $3 trillion in 2015. In response, organisations are significantly ramping up their cybersecurity investments. The global threat intelligence market size was estimated at $11.6 billion in 2023 and is expected to grow at a compound annual growth rate (CAGR) of 17.6% from 2024 to 2030. However, merely increasing budgets isn’t enough.

Exploited: Critical Unauthenticated Access Vulnerability in CrushFTP (CVE-2025-2825)

In the ever-evolving landscape of web application vulnerabilities, a new critical flaw has emerged. CVE-2025-2825 is a high-severity vulnerability that allows attackers to bypass authentication on CrushFTP servers. This popular enterprise file transfer solution is often used in corporate environments to manage sensitive data, making this vulnerability particularly concerning.