The data from this year's State of Secrets Sprawl report shows that AI is not creating a new secrets problem; it is accelerating every condition that already made secrets dangerous.
Backup remains the best approach to data protection for physical and virtual machines, even in the face of new threats to data integrity and accessibility. However, virtual machine backup presents a challenge to IT admins in terms of storage, VM performance, resource efficiency, security, and recovery times. There are multiple methods to choose from to back up VMs. This post explains the advantages and disadvantages of 3 backup methods.
In celebration of International Women’s Month and the 2026 theme, JFrog hosted a virtual fireside chat on March 19, 2026: Women in DevSecOps: Leveraging AI in the Software Delivery Lifecycle.
Rate this post Last Updated on April 9, 2026 by Narendra Sahoo HIPAA compliance costs range from $5,000 for a small medical practice to $150,000+ for a hospital system — and the right budget depends entirely on your organization’s size, security maturity, and data environment.
AI is making phishing attacks easier to create and scale. Tasks that once required manual effort can now be automated, allowing attackers to generate realistic messages, launch campaigns, and adapt tactics quickly to evade security controls. In fact, KnowBe4’s 2025 Phishing Threat Trends Report found that more than 73% of phishing emails analyzed in 2024 showed signs of AI involvement. As a result, phishing threats are becoming harder to detect using traditional methods alone.
Threat actors are impersonating Palo Alto Networks recruiters to target job seekers, according to researchers with Palo Alto’s Unit 42 security team. “These attacks specifically target senior-level professionals by leveraging scraped LinkedIn data to craft highly personalized lures,” the researchers write.
Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! Thankfully this common WP Plugin is well patched by now, but of course there will always be some who don’t enable auto-updates… But its better late than never for this one: Interesting, Rowhammer has migrated to the GPU.
Everyone is building sophisticated intelligence layers with improved models and smarter agents to automate threat detection, investigation, and response. It’s what is needed in order to mature into an AI SOC. However, the organizations seeing the most value from AI in their SOC are not focusing solely on the intelligence layer. They’re focusing on the data foundation first.