Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Deepfakes Are Impersonating Religious Figures to Solicit Donations

WIRED reports that deepfake attacks are impersonating pastors and other religious figures in order to scam congregations. Father Mike Schmitz, a priest who hosts a podcast with over a million followers, warned his listeners in November that AI-generated deepfakes were using his likeness to fraudulently solicit donations. WIRED found that several of these fake accounts are still active on TikTok, and they appear when a TikTok user searches for Father Schmitz.

Code Signing HSM Comparison for Secure Storage

A Hardware Security Module (HSM) is a tamper-proof device that has been built to generate, hold, and securely use cryptographic keys. With regard to Code Signing, an HSM guarantees that your private key (s) will remain inside a secure environment, without the ability for anyone else to take or abuse them in any manner. By doing this, the likelihood of your key being stolen, duplicated, or otherwise compromised is significantly reduced.

Top 10 SIEM best practices for modern security operations

Nowadays, it’s not uncommon for enterprise IT leaders to find themselves in a situation that seems like a catch-22. On one hand, they’re expected to make data-driven decisions that improve productivity and profitability in a business. On the other, they’re preoccupied with their core responsibilities such as protecting critical systems, maintaining network security, and accelerating investigations when a security event occurs. Traditional tooling won’t keep up with modern systems.

How X-Design's AI Agent Is Replacing Drag-and-Drop Branding Tools

The timeline for launching a brand has crashed. Two years ago, building an identity was a month-long slog of negotiations and revisions. Today, it happens in the afternoon. The old method of stitching together disjointed tools is dead; the market simply moves too fast for that.

Why Physical Infrastructure Still Matters in a Cyber World

As organizations accelerate cloud adoption and digital transformation, it's tempting to think physical infrastructure is becoming less important. Software-defined networks, virtual machines, and remote access tools dominate security conversations. Yet the reality is more nuanced. Digital systems still rely on physical foundations, and when those foundations fail, even the most sophisticated cyber defenses can unravel.

Advancing MITRE ATLAS AI Security Through Zenity's Contributions

MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) is a globally recognized AI security framework that catalogs adversarial techniques targeting artificial intelligence systems. Similar in structure to MITRE ATT&CK but purpose-built for AI, machine learning, and agentic systems, ATLAS translates abstract AI risks into concrete, actionable attack techniques that security teams can monitor and mitigate.

7 Reasons to Get Certified in API Security

API security is becoming more important by the day and skilled practitioners are in high demand. Now’s the time to level up your API security skillset. Wallarm University, our free training course, provides security analysts, engineers, and practitioners with hands-on skills you can’t get from documentation, videos, or traditional courses. Run real attacks, investigate real signals, and learn exactly how to defend API environments when it counts. Here are the 7 reasons you should register.

Quantified Cyber Risk Through an ERM Lens in NIST IR 8286 Rev. 1

Lack of data has rarely been a challenge that cybersecurity leaders in the enterprise setting have faced. In fact, cyber risk data is usually in abundance. The obstacle, thus, is instead twofold. Teams must first make sense of all of that information, and leadership must then be able to communicate what it means in a language that supports high-level decision-making. That gap between information and deeper understanding is where many cyber risk programs flounder.

DSPM for AI: Securing Data in the Age of Artificial Intelligence

Organizations across industries are adopting AI at a rapid pace. From utilizing this newer technology to process data and conduct business-critical tasks to individual employees experimenting with Gen-AI to enhance their workflows, artificial intelligence now touches multiple points of an organization's operations.