Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Identity at the Edge: How the Sixth Annual Identity Management Day Highlights the New Frontiers of Trust

Each year, Identity Management Day (IMD) serves as a global reminder that managing digital identities is more than a technical requirement; it is a cornerstone of modern trust. Now in its sixth year, IMD continues to emphasize how identity itself is evolving, stretching beyond human users to encompass machines, automated agents, and even AI-generated personas.

How To Conduct a DORA Gap Assessment

DORA compliance isn’t optional for financial entities in the EU. The Digital Operational Resilience Act demands a systematic approach to identifying and closing ICT risk gaps, and the data shows most institutions are struggling. If you’re responsible for DORA compliance, you need a clear roadmap. Let us walk you through exactly how to conduct a gap assessment that actually works. Failure to meet DORA compliance requirements can lead to regulatory penalties and operational disruptions.

What Is AI Context Security?

Every enterprise wants to use AI on its most valuable data — customer records, financial documents, clinical notes, legal files, engineering IP. The problem is simple: the moment that data enters an AI workflow, traditional security stops working. Firewalls protect the network. Encryption protects data at rest. Access controls protect the database. But none of them protect what happens when an AI agent retrieves five documents, synthesizes an answer, and delivers it to a user.

Multiple Cross-Site Scripting (XSS) Vulnerabilities in Mailcow

Mailcow is a widely used self-hosted and open source email server that hosts everything you'd need to manage mailboxes yourself. To assess its security, we set up a local instance and ran our AI pentesting agents against it. We found three XSS vulnerabilities, including a critical vulnerability that allowed unauthenticated attackers to take over administrator accounts while looking at their logs in the UI. Gaining access to a mailbox can have a serious security impact.

Navigating the Post-Mythos Landscape with Bitsight

The rise of AI-driven vulnerability discovery using Anthropic's Claude Mythos, as well as similar tools from Google and OpenAI, is completely changing the calculus of cyber risk. The number of vulnerabilities is exploding. The time it takes for exploits to appear is shrinking. The patching cadences and scan intervals, assessments and risk registers that many organizations still rely on are rapidly becoming ineffective.

NIST CSF 2.0: What's new in the Cybersecurity Framework

NIST CSF 2.0 expands the Cybersecurity Framework into a broader, risk-based model centered on governance, making leadership accountable for cybersecurity as an enterprise risk. It introduces a sixth core function, enhances supply chain and privacy integration, and improves usability for organizations of all sizes. Profiles, tiers, and new implementation resources help align security efforts with business objectives and evolving threat landscapes.

Announcing Approval Escalation: Stop Letting Stalled Approvals Block Your Team

Today, we’re introducing Approval Escalation, a new capability in Apono that automatically moves access requests forward when the original approver doesn’t respond in time. Because no one should be stuck waiting seven hours just to do their job.

Drilling vs Boring: Key Differences That Impact Precision

When you first step into the world of machining, it's easy to assume that all hole-making processes are basically the same. A hole is a hole, right? Not quite. If you've ever had a part fail tolerance checks or struggled with surface finish issues, you already know that the details matter. That's where the debate of drilling vs boring comes in. These two processes may look similar on the surface, but they serve very different purposes in real-world manufacturing. Choosing the wrong one can cost time, money, and even your reputation.