Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Penetration Testing for Insurance Firms: Boost Security, Compliance & Trust

Penetration testing for insurance firms has become a necessity as the sector faces a 309% surge in cyberattacks in H1 2025, compared to H1 2024. Attackers are no longer just after sensitive policyholder data; they are increasingly focused on disrupting core operations and undermining customer trust. With insurers handling massive volumes of personal and financial data, the stakes could not be higher. This heightened threat landscape makes penetration testing a necessity, not a checkbox.

The API Security Dilemma: Why Traditional Approaches Are Failing in the AI Era

Throughout the past few years, APIs have become the backbone of digital infrastructure. They enable software-to-software communication, improve integration and interoperability, support modular architecture, and more. But as API use has exploded, so has API traffic volume and complexity, making them increasingly difficult to secure. And the rise of AI agents and automation have complicated matters further. The result? APIs have become a favourite attack vector for cybercriminals.

Reflecting on Wallarm's Journey: Growth, Resilience, and What Comes Next

When we started Wallarm, we focused on the APIs that power modern apps. We built an API-first platform, used AI from day one, and secured early patents in behavior-based detection and automated policy creation. The result: real-time, inline blocking with automatic API discovery that protects production, not just dashboards. Today’s investment isn’t only fuel for innovation—it’s proof of enterprise recognition.

The Case of the Phantom Date: How a Single Pixel Fooled Our Visual AI

We’ve all seen it: a cutting-edge, multimodal LLM, capable of understanding complex documents, stumbles on a seemingly simple task. In our case, the model confidently reported a contract’s signing date as "March 30". The only problem? The document clearly stated "March 9th". It wasn't just a minor error; it was a baffling one that sent us down a rabbit hole of debugging.

Beyond Productivity - Using UAM to Understand Team Capacity & Burnout Risk

Burnout-related disengagement can cost organizations up to $21,000 per employee annually, or $5 million for a 1,000-person company. High workloads, digital fatigue, and constant multitasking are typical in modern workplaces. Many organizations struggle to recognize these signs early enough to act. Every day saved through proactive intervention helps recoup a portion of the $ 4,000–$ 21,000 per employee burnout risk.

Breach Risk Threat Monitoring: A Path to Clarity in Cyber Noise

The digital landscape is expanding at an unprecedented rate, driven by the mass migration to the cloud, the proliferation of IoT devices, and the rapid growth of AI. While this growth presents limitless opportunities, it also creates a daunting new reality for cybersecurity teams. As a company's digital footprint and attack surface expand, it becomes increasingly vulnerable to the growing number of threats, particularly those originating from the open, deep, and dark web.

4 ways to scale compliance with AI

You got compliant—congrats! That’s a big milestone. It tells customers, investors, and the world that you take security seriously. But compliance doesn’t stop at your first audit. As your company grows, so do the requirements. You’ll have to manage new frameworks, more policies, faster timelines, more scrutiny, and more complexity. ‍ Modern GRC teams need to do more with less.

Maximizing Your Security Investment with the Microsoft Azure Consumption Commitment (MACC)

If your organization has a Microsoft Azure Consumption Commitment (MACC), you’re already on the path to optimizing cloud spend. But are you making the most of it? MACC isn’t just a budgeting tool, it’s a strategic advantage. By transacting eligible solutions through the Azure Marketplace, you can decrement your commitment while accelerating your cloud security and operations. That’s where BlueVoyant comes in.

Salesloft Drift incident overview and CyberArk's response

It was recently reported that Salesloft’s Drift application was breached, allowing unauthorized access to its customers’ Salesforce data and affecting hundreds of organizations, including CyberArk. Upon learning of this incident, we quickly deployed threat containment measures, including terminating our Salesforce–Drift connection; disabling the Drift application and revoking all related user credentials; and rotating all Salesforce integration credentials.

Why Detection? Why Now? Key Takeaways from the NIST NCCoE Public COI Working Session

In April, I had the amazing opportunity to participate in a unique AI security event put on by the National Cybersecurity Center of Excellence (NCCoE). The April event was all about getting the community together to discuss what a Cyber AI Profile should look like as an overlay to the NIST Cybersecurity Framework (CSF) 2.0.