Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Announcing Threat AI: Security's First Agentic Threat Intelligence System

CrowdStrike is unveiling groundbreaking innovations across Counter Adversary Operations. Threat AI, a system of AI-powered agents built on the CrowdStrike Falcon platform, is the industry’s first agentic threat intelligence system. It provides mission-ready agents to reason, hunt, and take action against any stage of adversary activity. In addition, the new Threat Intelligence Browser Extension for Google Chrome extends intelligence everywhere analysts work.

CrowdStrike Collaborates with AI Leaders to Secure AI Across the Enterprise

AI is transforming how organizations operate, from automating workflows to fueling innovation and competitive advantage. It’s the backbone of the modern enterprise. But while the opportunities AI presents are enormous, they come with new risks: models can be stolen, cloud workloads can be hijacked, and data can be poisoned. Every layer of the AI stack — from GPUs and training data to inference pipelines and SaaS apps — is a new target.

What's In an Identity? The Executive Attack Surface and Rising Threat of VIP Impersonation

With time, effort, and a blessing from the LinkedIn networking Gods, a high-level executive's identity can be transformative for a company. More than just a name and title, these executives become symbols of authority and trust, someone employees, customers, and partners instinctively follow. Personas like Elon Musk and Tim Cook instill confidence and belief in their employees and consumers by championing their products and their ethos.

When It Comes to Breaches, Boards Can't Hide Behind CISOs Any Longer

A trend that has long been on the rise is finally having its day. A recent industry report revealed that 91% of security professionals believe that ultimate accountability for cybersecurity incidents lies with the board itself, not with CISOs or security managers. If the security discussion hadn’t fully made its way into C-suite conversations before, it has now.

Context-Aware Tokenization: How Protecto Unlocked Safer, Smarter Healthcare Data Analysis

The healthcare industry, despite being highly regulated, is one of the most targeted for breaches, necessitating tight measures. While these measures are necessary, they often restrict the free flow of information, critical for analysing patient outcomes and improving internal operations. Tokenization has long been a reliable method for masking protected health information (PHI). But not all tokenization is created equal.

The AI revolution in financial cybersecurity

Financial cybersecurity has never been a static discipline. Over two decades in this industry, I’ve seen it transform from a compliance checkbox to a cornerstone of business resilience—usually after a painful lesson. Today, we’re heading into the most significant paradigm shift for financial security since online banking: the convergence of artificial intelligence and machine identity governance.

NPM Account Compromise - Tracking the "Shai-Hulud" Worm

Amid growing reports from the security community, Veracode has been closely tracking the resurgence of a sophisticated threat actor behind the recent npm account compromise and the injection of malware into the widely-used ‘nx’ package. This evolved malware now exhibits worm-like capabilities, enabling it to spread rapidly and amplify its infectious impact across the ecosystem.

swampUP 2025 Recap: The Quantum Shift in Software Delivery Requires a Unified Approach

And that’s a wrap! Held in beautiful Napa Valley, swampUP 2025, JFrog’s annual customer conference brought together developers, operations, security, compliance, and AI/ML leaders – all facing the same burning challenges posed by the AI-driven quantum shift in software delivery. In the keynotes, breakout sessions, and side-conversations over wine and coffee, a common theme was made clear: a unified Software Supply Chain platform is essential to thrive in the new reality.

How To Build Cyber Resilience

Cyber threats are frequent, unpredictable, and indiscriminate—affecting organizations of every size and industry. For any organization, a cyber incident is a matter of “when,” not “if”. As such, businesses must be able to prepare for, respond to, and recover from incidents, and must continually refine these capabilities to stay ahead.

Shift Left With High-Potency Threat Intelligence for Prevention

In today’s ever-evolving threat landscape, security teams are under pressure to detect and respond to threats faster than ever. With the overwhelming volume and manual effort required to operationalize security, many organizations struggle to stay ahead. Arctic Wolf Threat Intelligence is here to help change that, by providing high-fidelity, actionable insights that empower teams to shift left and prevent threats before they escalate.