Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Protection vs. Cyber Resilience: Mastering Both in a Complex IT Landscape

Today's always-on, hyperconnected world requires CIOs to confront two equally important concepts: data protection and cyber resilience. As reliance on data to fuel analytics, engineering, marketing, and other key operations increases, the complexity surrounding IT infrastructure grows in tandem. Hybrid workforces, edge computing, cloud-native applications, and legacy systems add further complexity to the mix.

SquareX Collaborates with Top Fortune 500 CISOs to Launch The Browser Security Field Manual at Black Hat

SquareX announced the official launch of The Browser Security Field Manual at Black Hat USA 2025. In addition to a comprehensive practical guide to the latest TTPs attackers are using to target employees in the browser, this comprehensive manual features industry perspectives from leading CISOs from multiple Fortune 500 enterprises and other iconic companies, who share their perspectives on the evolving browser security landscape, the importance of each threat vector, and how they expect these attacks to evolve in the near future. Major contributors include.

Vanta Acquires Riskey to Transform Vendor Risk with Continuous, AI-Powered Monitoring

Vanta announces the acquisition of Riskey, a pioneer in real-time third- and fourth-party risk monitoring. The addition of Riskey's technology into Vanta Vendor Risk Management (VRM) significantly advances Vanta's capabilities in supporting security teams with an automated approach to VRM - replacing static point-in-time assessments with continuous, AI-driven risk intelligence.

Mapping Social Engineering Tactics to Detection Strategies in XDR

Social engineering isn’t just a trick of trade anymore, it is trade. Threat actors aren’t only targeting systems; they’re targeting people. And because humans are often the weakest link in cybersecurity, attackers use psychological manipulation to deceive users into giving up credentials, clicking malicious links, or downloading malware. The challenge? These attacks don’t always leave behind obvious traces. This is where Extended Detection and Response (XDR) becomes essential.

Harden Your Containers with Aikido x Root

TL;DR: Aikido and Root have teamed up to deliver hardened container images that fix vulnerabilities fast while letting you keep your current base image. Patch timelines shrink from months to minutes. More about the launch below, or check out our docs. Keeping containers secure isn’t as simple as “just update.” While it sounds straightforward, anyone who’s tried it in a real app knows it’s far from easy.

Why DevOps in Cybersecurity SaaS Are Leading the Shift to JIT Access

DevOps teams are moving faster than ever deploying AI agents, orchestrating automated workflows, and scaling infrastructure across cloud platforms. But as speed increases, so does the attack surface. Traditional access models weren’t built for today’s dynamic, machine-heavy environments, and static privileges have become one of the biggest security liabilities in SaaS.

Ensuring Compliance with DORA: How Trustwave Secures Your Databases and Meets Regulatory Standards

The EU’s Digital Operational Resilience Act (DORA) establishes a unified regulatory framework to ensure financial institutions can withstand and recover from IT disruptions. As a cornerstone of operational resilience, secure and compliant database environments are critical to safeguarding sensitive financial data and maintaining regulatory alignment.

RecipeLister: A Recipe for Disaster

The BlueVoyant SOC consistently monitors and analyzes threats within customers instances 24x7. One threat we have been tracking and observing has been a free-ware software known as RecipeLister. This software claims to provide users with the capabilities of viewing and downloading recipes in order to assist in the journey of staying healthy. While this capability was rather appetizing, we discovered there was more to be unpacked by this software.