Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Acronis earns a place on CRN Security 100 list for the fifth consecutive year

Acronis has earned a spot on CRN’s 2026 Security 100 list in the Identity, Access And Data Security category, marking its fifth consecutive year on the annual ranking. The program highlights channel focused security vendors that help organizations address a rapidly evolving threat landscape across categories such as endpoint and managed security, identity and data security, network security, security operations, and web and application security.

Hybrid Cloud Defense Grid: Bridging Wiz and Runtime Telemetry

The modern cloud security landscape is often fighting a war on two disconnected fronts. On one side, we have Cloud Security Posture Management (CSPM) platforms like Wiz, which act as the cartographers of risk—mapping terrain with high fidelity to identify open ports, unpatched vulnerabilities, and toxic permission combinations. On the other hand, we have Runtime Defense tools (SIEM, EDR, NGFW) that generate massive streams of activity logs.

The Real Risks of Agentic AI in the Enterprise with Camille Stewart-Gloster

In this episode of Data Security Decoded, host Caleb Tolin is joined by Camille Stewart-Gloster, CEO of CAS Strategies and former Deputy National Cyber Director, to unpack how AI is redefining cyber risk at every layer of the organization. Camille explains why identity-based attacks are so effective and how non-human identities (from APIs to AI agents) are quietly expanding the attack surface. She emphasized how critical MFA is for organizations to enable as they scale up AI operations, and why conditional access and governance must be foundational, not optional.

OpenClaw as a Security Threat - The 443 Podcast - Episode 358

This week on the podcast, we discuss OpenClaw, the open source chatbot that has exploded in popularity since launching late last year, and some of the risk it introduces to organizations. Before that, we chat about Ring's Super Bowl advertisement that caused a stir before ending with a Google Threat Intelligence Group report on advanced threat actor AI usage.

Ep 30: What is data pipeline management, and why does it matter for security?

On this episode of Masters of Data, we're joined by Eric Avery, Sumo Logic's head of infrastructure and data, to break down data pipeline management: efficiently moving massive data volumes from multiple sources to one usable location. We explore how pipelines fuel analytics and AI, the role of data transformation, and where OpenTelemetry fits in. Eric shares insights from processing 3.5 exabytes daily and how AI has reignited excitement around data. We also cover pipeline security, the shift from data lakes to AI-powered platforms, and practical digital security tips.

Generate audit-ready vulnerability and compliance reports with Datadog Sheets

Security teams are frequently asked to provide clear, time-bounded evidence of their organization’s security posture. Whether the request comes from external auditors validating SOC 2, ISO 27001, PCI DSS, or internal governance reviews, they typically require collecting vulnerability data from multiple tools, reconciling resource lists, and manually generating spreadsheets for auditors. This process is slow, error-prone, and difficult to repeat consistently.

Project Calico 3.30+ Hackathon: Show Us What You Can Build!

The Calico community moves fast. With the releases of Calico 3.30 and 3.31, brings improvements in scalability, network security, and visibility. Now, we want to see what YOU can do with them! We’re excited to officially invite you to the Project Calico 3.30+ Community Hackathon. Whether you’re a seasoned eBPF expert or a newcomer to the Gateway API, we welcome your innovation and your ideas!

Securing the New Control Plane: Introducing Static Scanning for AI Agent Configurations

Today, Mend.io is proud to announce the launch of AI Agent Configuration Scanning, integrated directly into the Mend AI Scanner. By treating “Agents as Code,” we are bringing security visibility and CI-friendly enforcement to AI configurations before they reach production The rapid adoption of AI agents has transformed the modern developer workflow.

Corelight at SC25: A laboratory for securing the fastest conference network

I’ve worked as a threat hunter in several Black Hat Security Conference Network Operations Centers (NOCs) across the globe. So I didn’t expect to be surprised by much when signing on to be a part of the NOC for SCinet—a conference that has the “fastest conference network in the world.” And yet I was surprised by just how diverse the SCinet NOC team was, how collaborative the environment was, and how much we were able to achieve with automation in such a short amount of time.