Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Solving the Hard Problems in Cybersecurity

We really enjoyed our conversation with Ed Amoroso from TAG Infosphere. We didn’t start Reach to chase headlines. We started it because the hard security problems weren’t getting solved. The important ones rarely are. Security only works when incentives are aligned to the customer’s actual outcome. Not noise. Not theater. Not (exclusively) shiny tools. That alignment is what makes the work worth doing.

Navigating the Agentic AI Era: Forward's Perspective from Cisco Live EMEA

Cisco Live EMEA 2026 Amsterdam has officially wrapped up, and the path forward is clear: we have entered the Agentic AI Era. The event was centered around an industry shift towards a unified platform where AI agents don't just respond; they act. At Forward Networks, we aren’t just watching this shift happen; we are providing the foundation required to make it a reality.

Is Google Drive Safe for Your Private Files?

Google Drive is the most popular cloud storage solution in the market with over 2 billion users worldwide. Despite this, due to recent concerns and more interest in online privacy, more people are asking is Google Drive safe for their files, photos, and videos. Of course, Google Drive and Google One offer advanced security and privacy features, but it falls short in privacy.

How Passkey Management Works in Keeper

Keeper’s passkey management works by letting you create, store and use passkeys directly from your Keeper Vault so you can sign in with biometric or device-based authentication instead of traditional passwords. By removing shared secrets and replacing them with cryptographic credentials tied to your device, Keeper makes signing in faster, more secure and resistant to phishing attacks.

LevelBlue Named a Representative Vendor in 2026 Gartner Market Guide for Outsourced Managed Security Services

LevelBlue is proud to announce it has been named a Representative Vendor in the just-released 2026 Gartner Market Guide for Outsourced Managed Security Services (OMSS). OMSS, which is a subset of Managed Security Services, provides organizations with specialized external expertise and operational support for critical cybersecurity functions.

EP25 - Identity is the attack vector w/ Udi Mokady

CyberArk founder and executive chairman Udi Mokady returns to Security Matters at a transformational moment—now as part of Palo Alto Networks, following the acquisition’s close on February 11. In this far‑reaching conversation, Udi and host David Puner explore why identity has become the attack vector for modern enterprises, driven by an unprecedented surge in human, machine and AI‑powered identities that attackers increasingly exploit.

G2 Names Feroot a 2026 Best Software Product in Data Privacy

We’re excited to share that Feroot has been named one of G2’s Best Software Products of the Year for 2026 in the Data Privacy category. This recognition is especially meaningful because it’s based on direct customer feedback. G2’s awards are powered by real-world reviews and outcomes, and we’re honored that customers chose to share their experience with Feroot. Even more humbling: our customers have given us an average rating of 4.9 out of 5 stars.