Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Code Mode: Giving AI Agents an Entire API in 1,000 Tokens (With Demos)

In this episode of This Week in NET, host João Tomé is joined by Matt Curry to break down Code Mode: a way to give AI agents access to the entire Cloudflare API (2,500+ endpoints) using two tools and roughly ~1,000 tokens of context. Instead of exposing thousands of individual tools (which quickly becomes expensive and brittle), Code Mode lets the model write JavaScript to search and execute against a compact API context. The result is massive compression, lower cost, and better performance.

How to Configure Jira OAuth/OIDC SSO Integration with Keycloak | Step-by-Step Guide

Managing user authentication across multiple platforms can be a challenge. By integrating Keycloak with Jira using the miniOrange OAuth/OIDC SSO plugin, you can centralize your identity management and provide a secure, seamless login experience for your team. In this video, we walk you through the full configuration process: from setting up a new Client in your Keycloak Realm to finalizing the OAuth settings within Jira. You’ll see how to handle the Root URL, Valid Redirect URIs, and how to map the Client Secret to get your SSO running instantly.

External Penetration Testing Tools: A Purpose Built Guide

The classic external penetration testing takes a systematic approach that includes reconnaissance, enumeration, validation, and proof-of-concept exploitation. Enterprise security teams deploy comprehensive suites of tools across the entire application, offering full lifecycle testing, which loses value when the toolchain isn’t purpose-built for each testing phase.

Outsource Penetration Testing: What Actually Works in 2026

The traditional model to outsource penetration testing was to engage a consultant to perform a once-a-year test, receive a lengthy PDF report, and then start the cycle again. This model today means something quite different: organizations are hiring external security professionals as continuous partners who constantly test, integrate into development pipelines, and deliver results in real time. It has grown from a check-the-box compliance activity to an integral part of a serious security program.

Why Legal AI Governance Must Operate at the Point of Use

A recent report of a solicitor facing regulatory investigation after uploading client documents into ChatGPT is not an isolated incident. It is a visible symptom of a broader structural issue unfolding across highly regulated industries. Legal professionals operate under strict duties of confidentiality, and yet the tools reshaping their workflows are being adopted faster than governance and operational controls can keep pace. The challenge is not whether AI should be used in legal practice.

Why identity security is a production asset in manufacturing

When a production line stops, the clock starts ticking. In manufacturing environments I’ve worked in, every minute of downtime can translate into missed delivery commitments and revenue you’ll never see again. How long that outage lasts will be decided in the first few minutes, when identity ownership and decision authority are still being sorted out. That authority gap is easy to underestimate. Manufacturing leaders already plan extensively for physical disruption.

Faster, smarter, more resilient cloud security with Tines and Netskope

Digital transformation can come at a cost. As organizations double down on cloud and web-based apps to drive efficiency and growth, security and IT teams often find themselves buried under a mountain of siloed data and complex alerts, leaving them unable to keep pace with an expanding attack surface..

I Don't Treat AI Video as a Toy Anymore - Not After Testing It Through a Security Lens

I used to look at consumer AI media tools as a novelty. Fun, impressive, occasionally useful - but still something I'd keep in a separate mental bucket from the things I take seriously. That changed when I started testing them the way I test anything else that touches trust, identity, and digital hygiene.

How to Choose the Best Patreon Alternative in 2026

Creator monetization has changed fast. In 2026, relying on a single platform like Patreon is no longer your only option. Many creators now want more control, higher profit margins, and better ownership of their audience. If you are building a membership, selling exclusive content, or offering paid communities, choosing the right platform matters. The wrong choice can limit your growth. The right one can help you scale faster, keep more revenue, and improve your relationship with your audience.

Financial Security for Cybersecurity Startups: Why Bookkeeping Is Your First Line of Defence

Cybersecurity startups spend enormous resources protecting client data. But many leave their own financial operations dangerously exposed. Sloppy bookkeeping leads to cash flow blind spots, missed tax deadlines, and compliance failures that can shut a company down faster than any cyberattack. Getting your financial infrastructure right is not just good accounting practice. For security companies, it is operational credibility.