Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Best Patch Management Software & Tools 2026

In our hyperconnected landscape, software vulnerabilities are proliferating at a record pace. In 2024 alone, more than 40,000 Common Vulnerabilities and Exposures (CVEs) were published, marking a 38% increase over the previous year. Many of these vulnerabilities are weaponized within days, leaving organizations exposed if updates are not applied immediately. Patch management software addresses this risk by automating the detection, acquisition, and deployment of software updates across an IT environment.

AI Meets Kubernetes Security: Tigera CEO Reveals What Comes Next for Platform Teams

Platform teams are tasked with keeping clusters secure and observable while navigating a skills gap. At KubeCon + CloudNativeCon North America, The New Stack spoke with Ratan Tipirneni, President and CEO of Tigera, about the future of Kubernetes security, AI-driven operations, and emerging trends in enterprise networking. The highlights from that discussion are summarized below.

Cato CTRL Threat Research: From Productivity Boost to Ransomware Nightmare - Weaponizing Claude Skills with MedusaLocker

Claude Skills is a new feature from Anthropic that has gained rapid adoption, with more than 17,000+ GitHub stars already since its launch in October 2025, allowing users to create and share custom code modules that expand Claude’s capabilities and streamline workflows. But as this ecosystem grows, Cato CTRL uncovered a serious oversight into how Skills are executed.

Security Visionaries | Disrupt or Defend? An AI Grudge Match

What does the rise of generative AI mean for the mandates of a CIO and CISO? In this episode of Security Visionaries, host Emily Wearmouth is joined by Netskope's Chief Digital & Information Officer (CDIO) and Chief Information Security Officer (CISO) to discuss top tips for both disrupting and defending your organization in the age of generative AI.

Falco for Kubernetes runtime security (eBPF, Rules, Tuning & Alerts)

Runtime attacks don’t wait for your next scan. Falco detects suspicious behavior in real time across Kubernetes, containers, and Linux hosts—using syscall signals (eBPF/kernel module) plus a rule engine and plugins. In ~10 minutes, you’ll learn how Falco works end-to-end, where it fits in a modern cloud-native security stack, and how to operationalize it without drowning in noise. In this video: Getting started checklist (practical).

Mastering ASPM: Unifying Your Application Security Strategy

Application security is becoming increasingly fragmented. Development and security teams use a wide array of tools for testing, protection, and supply chain security. While each tool serves a purpose, they often operate in silos. This fragmentation creates a disconnected view of an organization’s security posture, making it difficult to prioritize and remediate risk effectively.

Defining and Defending Against a Zero Day Attack

Unexpected attacks are the hardest to fend off. In the realm of cyber, Zero Day vulnerabilities are among the greatest risks, as these software flaws are unknown and exploited before a fix is available, potentially compromising the thousands of organizations that are unwittingly using vulnerable software.

Secure Your AWS Cloud with Falcon Next-Gen SIEM: Seamless Integration & Intelligent Detection

See how Falcon Next-Gen SIEM delivers instant, frictionless integration with AWS for full visibility in minutes. Watch how pre-built detections analyze every API call, connecting events into clear attack stories. With automated response playbooks that take immediate action, you can detect faster, respond smarter, and stop cloud threats before they spread. CrowdStrike Falcon Next-Gen SIEM: Consolidate security operations with the world’s most complete AI-native SOC platform.