Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

RSA 2026: Leading the way to secure agentic AI

Every year, security and tech leaders come to the RSA conference in San Francisco to take the industry’s pulse, and every RSAC tends to be dominated by a single, overarching theme. Last year, the theme was: “AI agents are coming, and governance isn’t ready.” And sure enough, the theme of RSAC 2026 was: “AI agents are here, and governance needs to catch up.”

10 Questions CIOs Should Ask to Modernize Security Operations

Chris Jacob, Field CISO, Securonix For years, security operations has been measured by effort. More alerts are reviewed. More logs are ingested. More tools are deployed. More dashboards are built. On paper, that can look like progress. In practice, many CIOs know better.

How Secure Sharing in Keeper Works

Secure sharing in Keeper works by encrypting records with record-level encryption keys, enforcing granular permissions and giving administrators centralized policy control and audit visibility into how sensitive credentials, passkeys and privileged resources are accessed. Keeper’s zero-knowledge architecture ensures that only authorized users can decrypt shared data, while flexible sharing options support everything from everyday collaboration to enterprise-grade Privileged Access Management (PAM).

Riding the Rails: Arctic Wolf Tracking Threat Actors Abusing Railway PaaS for Microsoft 365 Token Compromise

Arctic Wolf has recently observed a phishing campaign targeting Microsoft 365 that abuses the OAuth device code flow to trick victims into providing authentication codes. Threat actors use Railway’s Platform-as-a-Service (PaaS) infrastructure (a trusted cloud platform with valid IP addresses) to host attack components, allowing the activity to blend in with normal traffic. This enables threat actors to steal valid access and refresh tokens and bypass multi‑factor authentication protections.

Building a Unified Security Program with LevelBlue MDR

A piecemeal security strategy is a losing one. Simply having a collection of disparate MDR security tools and services isn't enough to protect your organization. The real power lies in seamlessly integrating them into a unified and cohesive defense. LevelBlue understands the value of Managed Detection and Response (MDR), is unlocked when it’s not just a standalone MDR service, but the central nervous system of a comprehensive security ecosystem.

RSA 2026: The Shift Toward Security FOR AI

RSA Conference 2026 made one thing clear very quickly. Security leaders are done with generic AI pitches. After two years of relentless “AI everything,” the market is now pushing back. There is a growing fatigue with vague promises, surface-level features, and what many are calling outright AI washing. The result is a trust gap. What cut through this year was not another AI-powered detection claim. It was a much more grounded question.

What the Stryker Cyber Incident Reveals About Todays Risk, Visibility, and Hardening

In March 2026, Stryker Corporation experienced a global cyber incident that disrupted operations across its environment. Manufacturing slowed, internal systems went offline, and employees were instructed to disconnect devices. At first glance, it looked like another large-scale cyberattack. It wasn’t. This incident exposed a much more important reality about modern cybersecurity risk: organizations are no longer being breached in traditional ways.

The Best Proactive Cybersecurity Tools for SMEs (and Where They Fall Short)

Most proactive cybersecurity tools for SMEs are designed to stop attacks before damage occurs. That sounds sufficient. It isn’t. In practice, most attacks don’t succeed before defenses activate or after alerts are triggered. They succeed during a narrow window where users are actively interacting with malicious environments and unknowingly handing over valid credentials. This is where most security stacks lose visibility. For SMEs, it is where most account takeovers (ATO) actually happen.

How Adaptive Email Security Helps Navigate Threats in the Age of AI

A finance employee receives an email that appears to come from the CFO requesting urgent payment approval. The message references a current project, uses the correct tone, and arrives at a plausible time. However, the email wasn’t written by a colleague — it was generated by AI. And it contains a malicious link. These attacks are becoming more common as threat actors use AI to produce convincing phishing emails, automate impersonation attempts, and launch social engineering campaigns at scale.