Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

This May Be Hurting Your Incident Response Efforts...

Some of the biggest delays in incident response aren’t caused by the attacker… they’re caused by the first steps taken after discovery. A few examples of well-intentioned actions that can unintentionally slow investigations and extend recovery timelines: Resilience isn’t built during an incident. It’s built before one ever happens.

The Transformation of Third-Party Risk Management from SecurityScorecard

Ready for the future of Third-Party Risk Management (TPRM)? The supply chain is a growing target, but you can fight back. That world is here with the transformative, threat-informed SecurityScorecard TITAN AI Platform. Imagine a world where you go beyond checking compliance boxes by actively mitigating and eliminating risk with continuous, AI-accelerated, and predictive TPRM that allows you to gain visibility and prioritize threats more effectively. Learn more about the TITAN transformation.

Quantum Computers Threaten Encryption - Here's the Fix | Sharon Goldberg

What happens to Internet security when quantum computers become powerful enough to break today’s encryption? In this clip from a full conversation on This Week in NET, Sharon Goldberg explains why researchers and companies are preparing for post-quantum cryptography, what could be at risk if current encryption is broken, and why the timeline may be closer than many expected. This clip is from the This Week in NET podcast about the future of encryption, quantum computing, and post-quantum cryptography.

How to know if your agents are correct with Dylan Williams

Join us for this week's Defender Fridays as we explore AI agent evaluation with Dylan Williams, Co-founder and Chief Research Officer of Spectrum Security. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Why Your Security Tools Are Useless Against AI?#short #ai

Most companies believe their security tools—WAF, EDR, API gateways—are enough to stop cyber attacks. But AI has changed the game. AI-powered attacks: –Learn your security patterns–Adapt in real-time–Bypass traditional defenses These tools were built for a predictable world. AI attackers are non-stop, intelligent, and evolving. That’s why even the best security systems are failing against modern AI threats.

Rogue AI App Use

HungryClaw… OpenLobster… KrillBox? Shout out to @AlexisGay for shining a light on the fact that shadow IT tools are getting more (shell)fishy—and dangerous—by the minute. According to our own findings, within 90 days of connecting to Vanta, organizations discover ~140 shadow IT tools accessing their environment. That's a lot of claws grabbing at your data. More insights to come! Stay tuned for our new Trust Signals series.

Ep. 54 - EU Cyber Resilience Act (CRA) Explained: What Every Security Leader Must Do Now

The EU Cyber Resilience Act (CRA) is set to transform cybersecurity—from a best practice into a legal requirement. But what does that "actually" mean for security teams, product leaders, and CISOs? In this episode, host Tova Dvorin and cybersecurity expert Adrian Culley break down the CRA in plain terms—and explain why the shift to continuous security validation is unavoidable. You’ll learn: With enforcement deadlines approaching and significant penalties on the horizon, the message is clear: If your security testing isn’t continuous, it’s not CRA-ready.