Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

NIST AI RMF: Everything you need to know

The NIST AI Risk Management Framework (RMF) is one of the most advanced, globally accepted guidelines for the safe and responsible use of AI systems. If your organization implements AI in any capacity, adopting the NIST AI RMF can be a significant move toward future-proofing your operations and strengthening AI trustworthiness among customers.

Snyk vs Aikido Security | G2 Reviews Snyk Alternative

So you’re in the market for application security, perhaps even a Snyk alternative. Whether it’s your first time exploring a code security platform or you’re a seasoned user searching for better options, you’re in the right place. When developers and businesses evaluate their choices, two names often rise to the top: Aikido Security and Snyk. Both platforms offer comprehensive tools for engineering teams to secure their applications, but how do they really compare?

The Howler Episode 15: Debra Sevelius, VP of Legal

This month we sit down with Debra Sevelius, Vice President of Legal, as she shares the "glamorous side of commercial legal," her love of curling, and much more! As the Head of Commercial Legal at Arctic Wolf, Deb is an experienced, collaborative, globally-minded executive leader, with a proven record in leading legal and cross-functional operational teams that deliver pragmatic win-win outcomes that maximize long term value, achieve process efficiencies, and increase revenue.

TLS Inspection Made Safe & Simple: A Game-Changer from Cato!

Experience how Cato Networks' revolutionary Safe TLS Inspection eliminates the complexity of inspecting encrypted traffic without impacting performance or user experience. In this demo, see how Cato’s data-driven, automated approach selectively inspects only safe-to-inspect traffic, enabling organizations to uncover hidden threats, prevent data leaks, and fully leverage advanced security features like CASB and DLP. Discover how simple it is to activate this game-changing feature, unleashing the full potential of the Cato SASE Cloud with just a few clicks.

Feature Announcement: Enhancing ARMO Platform's Threat Detection and Response

We are excited to announce the upcoming enhancement of ARMO Platform’s Threat Detection and Response feature, designed to provide more robust, real-time security protection for your cloud and Kubernetes environments. While the existing feature effectively detects anomalies, suspicious behavior, and active threats, we recognize the need for additional critical components: Policies, Response, and notifications.

Trustwave's 2025 Cybersecurity Predictions: The Era of End-to-End AI Cyberattacks is Here

As 2024 has wrapped up, we went around the room and asked some of Trustwave’s top executives what cybersecurity issues and technology they saw playing a prominent role in 2025. I'm willing to go on a limb this year and say there is an excellent chance we will see the first fully autonomous and end-to-end malware, ransomware, or other cyberattack campaigns take place.

TrustCloud Product Updates: December 2024

A core product tenet at TrustCloud is delivering a “Joyfully Crafted” user experience for our users. As we wrap up 2024, the TrustCloud product and UX team went through all the user feedback we received this year, and identified some key “quality of life” improvements to make the day-to-day experience for our users more approachable. We’re excited to share these updates with you.

Cybersecurity Challenges in Modern Supply Chains with Cassie Crossley | Secrets of AppSec Champions

Supply Chain Security: A Complex Web of Risks and Responsibilities The supply chain for a single device involves thousands, potentially millions of people over time. It's far too large a topic to fully grasp everything. I talk daily with folks about hardware specifics, human rights management, materials, chemical makeups and more. It's much more than just the bits and bytes we normally see.