Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Passkey Management Works in Keeper

Keeper’s passkey management works by letting you create, store and use passkeys directly from your Keeper Vault so you can sign in with biometric or device-based authentication instead of traditional passwords. By removing shared secrets and replacing them with cryptographic credentials tied to your device, Keeper makes signing in faster, more secure and resistant to phishing attacks.

LevelBlue Named a Representative Vendor in 2026 Gartner Market Guide for Outsourced Managed Security Services

LevelBlue is proud to announce it has been named a Representative Vendor in the just-released 2026 Gartner Market Guide for Outsourced Managed Security Services (OMSS). OMSS, which is a subset of Managed Security Services, provides organizations with specialized external expertise and operational support for critical cybersecurity functions.

EP25 - Identity is the attack vector w/ Udi Mokady

CyberArk founder and executive chairman Udi Mokady returns to Security Matters at a transformational moment—now as part of Palo Alto Networks, following the acquisition’s close on February 11. In this far‑reaching conversation, Udi and host David Puner explore why identity has become the attack vector for modern enterprises, driven by an unprecedented surge in human, machine and AI‑powered identities that attackers increasingly exploit.

G2 Names Feroot a 2026 Best Software Product in Data Privacy

We’re excited to share that Feroot has been named one of G2’s Best Software Products of the Year for 2026 in the Data Privacy category. This recognition is especially meaningful because it’s based on direct customer feedback. G2’s awards are powered by real-world reviews and outcomes, and we’re honored that customers chose to share their experience with Feroot. Even more humbling: our customers have given us an average rating of 4.9 out of 5 stars.

Access control in cybersecurity

Access control defines who can access data and systems across an IT environment and under what conditions. Common models include DAC, MAC, RBAC, and ABAC, each supporting different governance and risk requirements. Strong access control depends on MFA, least-privilege enforcement, continuous audits, and clear visibility into sensitive data.

Rethinking data governance and global compliance

Across Europe and beyond, regulatory frameworks are reshaping how and where organizations manage data. These laws establish enforceable standards for data sovereignty, data governance, and data privacy that directly influence cloud architecture, security strategy, and AI innovation. Without these regulations, you run the risk of these organizational consequences: Data management shouldn’t be considered as only a task for IT. It’s a board-level priority.

How Smarter Security Economics Reduce Risk Without Breaking the SOC Budget

Most people don’t manage their personal finances by spending every dollar the same way. You don’t pay rent, groceries, retirement savings, and entertainment out of one undifferentiated bucket. You allocate intentionally covering daily necessities, protecting the future, and investing in things that improve quality of life. Yet that’s exactly how traditional SIEM pricing works. Every log costs the same. Every gigabyte is treated equally.

Sam the AI SOC Analyst: How a Modern SOC Works When the AI is the Conductor

Security operations have never been more complex. Analysts face more alerts, more tools, and more pressure to make the right decision at the right moment. The work feels less like running a security program and more like trying to keep an orchestra in sync while each musician plays from a different sheet of music. This is the challenge Sam was created to solve. Sam, the Securonix AI SOC Analyst, acts like a skilled conductor guiding a symphony.

AI Priced by Productivity, Not Promises

Security operations teams are facing a structural problem that tools alone cannot solve. Alert volumes continue to rise. Telemetry is fragmented across cloud, SaaS, identity, and endpoint environments. Experienced analysts are stretched thin, and hiring additional talent has become increasingly difficult. At the Same time, boards are demanding faster response, stronger governance, and clear proof that security investments are delivering measurable value. AI is often presented as the answer.