Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OPC UA Exposure Snapshot: A Year in Review of Internet-Facing Devices

Over the past year, Bitsight TRACE has identified 14,220 unique internet-exposed Open Platform Communications Unified Architecture (OPC UA) servers globally. Given OPC UA's critical role as a communication backbone for modern industrial control systems (ICS) across numerous sectors, this level of exposure warrants a closer look. Our analysis reveals that over half (51.74%) of these devices allow unauthenticated access, while 80.26% transmit data in plaintext without encryption or integrity protection.

The Security Debt Crisis: Why 82% of Organizations Are Struggling

Modern software development has a fundamental problem: we are writing code faster than we can secure it. This creates security debt, a quantifiable backlog of unaddressed vulnerabilities that lingers for over a year. Much like financial debt, it compounds interest over time, but the currency is risk. Despite increased investment in security tools, this backlog is growing, not shrinking. With security debt reaching a critical mass in 2026, organizations must shift their strategy.

Rubrik Agent Cloud Explained!

AI agents are active across your enterprise, yet most teams lack visibility into their actions or access to them. This video introduces Rubrik Agent Cloud, offering a Centralized Registry for full agent visibility and Policy-based Governance to monitor and block unauthorized actions in real time. And for the rogue agent, quickly undo damage with Agent Rewind.

Falcon Exposure Management Browser Extension Control: Demo Drill Down

Browser extensions are a growing and often unmanaged attack surface, with many requesting access to credentials, cookies, and sensitive browsing data. Most organizations rely on fragmented tools that lack centralized visibility and consistent enforcement. In this demo, see how Falcon Exposure Management introduces Browser Extension Control to define rule groups, configure allowlist or blacklist policies, and assign enforcement to host groups—all from the Falcon platform.

The Resilience Retainer: Incident Response Retainers, Reimagined

Too many organizations today still rely on "legacy" retainer models. These traditional contracts are often rigid, opaque, and reactive, and designed for a world that no longer exists. That’s why LevelBlue is proud to announce the Resilience Retainer. This is a modern, flexible approach built on our experience of handling more than 9,000 cyber incidents worldwide. This up-to-date approach is a necessity, given the long-lasting impact an incident can have.

Protect your OCI resources with Datadog Cloud Security

Organizations adopt multi-cloud architectures for many reasons, including compliance requirements, business strategy, and resiliency. Regardless of the cloud provider, the security challenges remain the same: Identify the most critical risks, prioritize them with business context, and remediate them before they are exploited by a bad actor.

AI Security Posture Management (AI-SPM): The Complete Guide to Securing AI Workloads

Every cloud security vendor now has an AI-SPM dashboard. Strip away the branding, though, and most of these dashboards are doing the same thing: checking IAM configurations, scanning for misconfigured network access, inventorying AI models across cloud accounts, and flagging compliance gaps. It’s cloud security posture management with an AI label applied. That’s a problem, because AI workloads don’t behave like other cloud workloads.