Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Keeping the Internet fast and secure: introducing Merkle Tree Certificates

The world is in a race to build its first quantum computer capable of solving practical problems not feasible on even the largest conventional supercomputers. While the quantum computing paradigm promises many benefits, it also threatens the security of the Internet by breaking much of the cryptography we have come to rely on. To mitigate this threat, Cloudflare is helping to migrate the Internet to Post-Quantum (PQ) cryptography.

Impending Chaos: One in Twenty Small Businesses Will Suffer Financial Loss

The most underserved cyber insurance market is the small and medium-sized businesses, emphasis on the small. There are roughly 33 million small business in the United States, and according to the insurance industry, there are only 4.3 million cyber insurance policies issued to small businesses… So what options do they have?

EP 18 - The humanity of AI agents: Managing trust in the age of agentic AI

In this episode of Security Matters, host David Puner sits down with Yuval Moss, CyberArk’s VP of Solutions for Global Strategic Partners, to explore the fast-evolving world of agentic AI and its impact on enterprise security. From rogue AI agents deleting production databases to the ethical blind spots of autonomous systems, the conversation dives deep into how identity and Zero Trust principles must evolve to keep pace.

Making AI Less "Wednesday:" A Practical Guide to Using AI in Cyber Defense

Artificial intelligence has only been available for a relatively short period. Still, already many cyber defenders are as frightened as if Jenna Ortega’s Wednesday Addams had whipped her head around and set her dark, dangerous eyes on them. It’s not hard to see why. Machine learning, Gen AI, and Retrieval-Augmented Generation (RAG) are a few of more than 20 new acronyms flooding our industry, with more being added almost every day.

The Top 10 Endpoint DLP Solutions of 2025 (and 30 FAQs Every Security Team Should Know)

Nightfall delivers the most comprehensive endpoint DLP in 2025 by combining lightweight agents with cloud-native architecture, protecting Windows, Mac, endpoints while uniquely preventing data leaks to AI tools with 95% accuracy.

JFrog & GitHub: Unifying the Software Supply Chain, One Step at a Time... and Our 2025 GitHub Technology Partner Award

Organizations increasingly demand platforms that not only accelerate software delivery but also provide trust, security, and traceability. At JFrog, the software supply chain is managed and secured by default, from commit to runtime. That’s why our deep integration with GitHub is central to how we help teams manage, monitor, and secure every step of software delivery. In this post, we’ll explore.

Clean IPs are the Foundation of Network Automation Success

Every automation initiative starts with excitement, intent-based networking, AI-driven decisions, and Python scripts promising speed and resilience. But when someone asks, “Do we know what IPs are in use?” silence often follows. If your IP tracking lives in spreadsheets, you’re not alone, but you are vulnerable. Before writing a single script, teams need an authoritative and current IP source of truth.

Using LLMs to filter out false positives from static code analysis

Static application security testing (SAST) is foundational to modern application and code security programs. Yet these tools inevitably produce false positives that require manual review. When scanners find vulnerabilities that are not genuine issues, they erode trust, slow down remediation, and make it harder for teams to understand which alerts require attention.

The API vulnerabilities nobody talks about: excessive data exposure

TLDR: Excessive Data Exposure (leaking internal data via API responses) is the silent, pervasive threat that is more dangerous than single dramatic flaws like SQL Injection. It amplifies every other API vulnerability (like BOLA) and happens everywhere because developers prioritize speed over explicit data filtering. Fixing it means systematically checking hundreds of endpoints for unneeded PII and sensitive internal data.