Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Data Exfiltration Prevention: 5 Best Practices for Modern Security Teams

The security landscape has shifted dramatically. Employees now work across dozens of applications, browsers, and devices—often using personal accounts alongside corporate ones. They're adopting generative AI tools at unprecedented rates, and your source code is moving between repositories faster than traditional DLP tools can detect. This creates a fundamental problem: how do you enable productive work while preventing corporate IP from leaving your trusted environment?

Coinbase's $400 Million Wake-Up Call: Why DLP Must Monitor Behavior, Not Just Content

In May 2025, Coinbase disclosed a data breach that exposed nearly 70,000 customer records—not through a sophisticated external attack, but through bribed customer service agents. The cryptocurrency exchange refused a $20 million ransom demand and instead pledged that amount toward catching those responsible. One arrest has been made in India, but the incident highlights a fundamental problem in modern security: your people can become your greatest vulnerability.

When Hundreds of Patch Findings Require One Fix

In large-scale security environments, the primary challenge is often execution rather than a lack of detection. When multiple security tools report the same missing patch on a single machine, it creates hundreds of redundant findings that inflate backlogs and cause ticket-based workflows to break down. By aggregating these overlapping alerts into a single remediation action centered on the root cause, organizations can align their work with actual outcomes.

Top 5 Cybersecurity Companies in Ireland

Doing business in Ireland in 2026 means operating in one of Europe’s most active cloud and data ecosystems and one of its most targeted cyber threat environments. As a leading hub for global technology, financial services, and data-driven enterprises, organizations across Ireland face growing pressure to strengthen their cybersecurity posture.

Introduction to Netwrix's Security Research

If you haven’t heard yet, Netwrix recently formed a dedicated in-house Security Research team on July 15, 2025. The team focuses on producing research across areas like identity, data security, AI, and cloud, while also translating publicly available research into practical improvements across our product portfolio so customers can benefit from it.

AI Infrastructure Needs an Agentic Identity Framework - We're Building It

AI agents are about to cross a threshold. For infrastructure and security leaders, agentic AI is no longer an innovation topic but a production readiness problem. What started as sandboxed applications and tech demos at trade shows (bet you’ve seen a few of those) has morphed into long-running autonomous actors operating directly in production cloud and on-prem infrastructure. They read data, write code, deploy services, access databases, and make decisions continuously across environments.

Practical Tips for Tracking Vulnerability Remediation Progress

When vulnerability remediation succeeds at enterprise scale, it’s very rarely because the vulnerability management team is finding more vulnerabilities. It’s because the program was built around the idea of turning messy findings into steady, measurable risk reduction. That’s not an easy task. It’s easier to make it a numbers game, pointing to vulnerability volumes and how many findings were addressed, rather than accurately depicting how much real risk was eliminated.

EP 24 - FOMO, identity, and the realities of AI at scale

In this episode of Security Matters, host David Puner sits down with Ariel Pisetzky, chief information officer at CyberArk, for a candid look at the fast‑evolving intersection of AI, cybersecurity, and IT innovation. As organizations race to adopt AI, the fear of missing out is driving rapid decisions—often without enough consideration for identity, security, or long‑term impact.

Azure SQL Database Backup: A Complete Overview

Your Azure SQL database contains business-critical data that drives operations, analytics, and customer experiences. Losing this data, even temporarily, can impede revenue, damage customer relationships, and create compliance problems. Learning how to back up an Azure SQL database is essential for business continuity.