Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automating compliance: Why identity security needs a data-driven tune-up

When I started my career on the trade floor of a Canadian bank, I quickly learned what it meant to work in a fast-paced, highly regulated environment. Every identity had to be secured, justified and auditable. Later, when I moved to the security engineering team, I saw firsthand how compliance could consume entire teams. We weren’t just protecting accounts; we were constantly running manual processes to prove that the right controls were in place.

Cloud access simplified, secured, and just a request away

CyberArk introduces Access Requests for Secure Cloud Access: Secure, seamless user experience for requestors and approvers alike. Securing and requesting access to multiple clouds can feel like navigating through a maze of approvals and endless tool-switching. In an ideal world, access requests would provide users with frictionless, just-in-time access across AWS, Azure, and Google Cloud from within their existing platform.

Building a more secure npm ecosystem with Mend Renovate

Over this last year, we’ve seen significant attacks like the Shai-Hulud worm, the Nx build system compromise, and secrets being leaked to public GitHub Actions logs via the tj-actions/changed-files compromise, but I could spend the entirety of this article only listing different attacks, let alone talking about them.

Building Fast, Staying Secure: Supabase's Approach to Secure-by-Default Development

As part of Aikido’s Security Masterclass series, Mackenzie Jackson sat down with Bill Harmer (CISO, Supabase) and Etienne Stalmans (Security Engineer, Supabase) to explore how Supabase approaches security as part of design, not something to bolt on later. From Row Level Security (RLS) to the risks of AI-assisted coding, the discussion focused on what it takes to build fast and stay secure.

AI as a Power Tool: How Windsurf and Devin Are Changing Secure Coding

We brought together Ian Moritz, Deployed Engineer at Cognition, and Mackenzie Jackson from Aikido Security for a live masterclass on AI-assisted coding. The goal wasn’t to hype new tools. It was to talk about how developers can stay in control while AI starts writing, testing, and securing code beside them.

Malware Families, Mobile Threats, and the Human Risk Narrative Shaping Cybersecurity

The battle against cyber threats is never-ending — and mobile is the new battleground. Modern workers now rely on mobile devices to access sensitive information, often using a single device for personal and professional purposes. As a result, malicious actors have sensed a blind spot and are using these devices as the first line of attack to gain a foothold into secure systems. 1.2 million enterprise employees were exposed to mobile phishing attacks in Q2 2025.

Clarity in Exposure Management

Vulnerability reports shouldn’t read like riddles. Seemplicity’s Clarity AI Agent transforms dense, technical scanner output into clear, contextual language everyone can understand — bridging the gap between security, IT, and engineering. Discover how Clarity makes every finding readable, actionable, and ready for remediation.

Scaling Exposure Management: Program Maturity and Continuous Optimization

Building an exposure management program is just the beginning of a long journey. True success comes from scaling that program through continuous optimization, measurable progress, and organizational alignment. As enterprises expand their digital footprint, exposure management must evolve from reactive vulnerability remediation to a proactive, data-driven discipline that continuously strengthens resilience.