Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Powering Wider Global DLP Coverage with Three New Detectors from Nightfall

‍A DLP solution is only as strong as what it can detect. Gaps in detector coverage aren't just a technical inconvenience; they're exposure windows. Every format that goes unrecognized is a policy that can't fire, a remediation that can't happen, and a breach waiting to occur. Three new detectors are now available in Nightfall: personal photos (selfies and headshots), Malaysian Driver's License numbers, and South African National ID numbers.

Secure the Supply Chain at Scale with Step Security and Seemplicity

CI/CD risks don’t get fixed on visibility alone. Step Security surfaces pipeline exposures, while Seemplicity turns them into clear, assigned remediation tasks, grouped by fix and owner, routed into existing workflows, and tracked through resolution, so teams can reduce exposure faster and prove progress.

Securing AI Agents on GKE: Where gVisor, Workload Identity, and VPC Service Controls Stop Working

You enable GKE Sandbox on a dedicated node pool, bind Workload Identity Federation to your AI agent pods, wrap your data services in a VPC Service Controls perimeter, and deploy your agents with the Agent Sandbox CRD using warm pools for sub-second startup. Your security posture dashboard shows every control configured and active. And then an attacker uses prompt injection to trick an agent into exfiltrating sensitive data through API calls that every single one of those layers explicitly allows.

Observe-to-Enforce: How Progressive Security Policies Reduce Blast Radius

Last Tuesday, your security architect opened a pull request to add network policies to the payments namespace. The PR sat for six days. Three engineers commented with variations of “how do we know this won’t break checkout?” Nobody could answer. The PR got marked “needs discussion” and moved to a backlog column where it joined the fourteen other security hardening tickets nobody will touch.

eBPF for AI Agent Enforcement: What Kernel-Level Security Catches (and What It Misses)

Your team deployed Tetragon six months ago. TracingPolicies are humming along—you’re catching unauthorized binary executions, blocking suspicious network connections, and generating seccomp profiles from observed behavior. Runtime security for your traditional workloads is solid. Then engineering ships their first autonomous AI agent into production. A LangChain agent connected to internal databases, external APIs through MCP tool runtimes, and a vector database for RAG.

How Investment Firms Can Secure Trading Platforms With Keeper

Investment firms operate at the heart of global capital markets, managing assets, executing large volumes of transactions and relying on technology to transfer funds in real time. For all of this activity, investment firms rely on trading platforms, which are systems that route orders to alternative markets, analyze data, execute trades and measure performance across portfolios.

Zero Trust: Execution is now the standard

In January 2026, the National Security Agency released its first Zero Trust Implementation Guidelines (ZIGs). Their aim was to do something prior guidance intentionally avoided: move Zero Trust from architectural alignment to operational execution. That timing matters. Zero Trust has been a framework for years and rightly so. Like a quality standard, it is designed to evolve. The same tools, techniques, and skills shaping modern cyber defense are available to both friend and foe.

How intelligent workflows help MSSPs deliver customer outcomes at scale

For managed security service providers (MSSPs), customer loyalty is the most critical indicator of business health. Unlike other metrics that you directly control, such as mean time to respond or mean time to detect, it can’t be gamed: customers will either stay with you or they’ll churn. This means that the top priority for any MSSP should be to deliver the specific customer outcomes they were hired to provide, like helping to stop threat actors before they cause damage.

Tackling alert fatigue with AI & automation: How MSSPs scale Tier 1 triage

For managed security service providers (MSSPs), alert fatigue doesn’t just burn out your analysts: it’s a real risk to your business. From the financial costs of missed SLAs and security incidents to the customer trust lost when critical alerts are overlooked, alert fatigue negatively impacts customer outcomes, client retention, and your profitability.

Feroot Launches AI-Powered Digital Consent Audit to Prove CMP Enforcement

Organizations have invested heavily in consent management. Consent Management Platforms (CMPs) are standard infrastructure for privacy programs, and for good reason. Regulations like GDPR, CCPA/CPRA, LGPD, PDPA, and HIPAA require organizations to obtain, record, and honor user consent before collecting or processing personal data. CMPs provide the framework to do that. Most organizations have done the right thing, they just don’t know if they’ve done the right thing right.