Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI: The Cybersecurity Revolution or Apocalypse? Interview with Steve Wilson at DAVOS 2025

AI is reshaping both innovation and cybercrime, with attackers leveraging its power to outpace traditional defenses. As cybercrime costs surge, organizations must adopt strategies to bridge the cybersecurity skills gap and adopt AI to stay ahead.

Magento SSO - Login into WordPress using Magento Credentials

In this Video we will learn how to configure Magento as an Identity Provider and WordPress as a Service Provider for seamless Single Sign-On (SSO) using Magento IDP extension. This integration allows users to log in to your WordPress site using their Magento account credentials.

Logs Are for Campfires: Splunk's Asset and Risk Intelligence Leaves No Vulnerability Undiscovered!

Splunk Asset and Risk Intelligence empowers organizations to identify and address vulnerabilities in their security posture proactively. By leveraging key compliance framework controls and providing customizable dashboards and metrics, ARI offers clear visibility into assets missing critical security controls. This allows organizations to proactively close gaps in security controls, regardless of the regulatory frameworks they must comply with.

Matching AI Strengths to Blue Team Needs

Much has been written about how AI, particularly Large Language Models (LLMs), will transform cybersecurity. Some say it'll be for the worse, and some say it'll be for the better. Although SURGe firmly believes that AI will end up helping defenders much more than it helps threat actors, it's sometimes hard to envision the exact form in which this help will, or should, come.

How Detectify embraces the best of both DAST and ASM

Below, we’ll take a look at how both DAST as a methodology and DAST as a tool relate to what we do at Detectify. More specifically, we’ll explain how Detectify’s solution applies DAST methodology to the full breadth of an attack surface, automating the heck out of application security testing. With these methods, we cover millions of domains before you’ve even had breakfast.

Profits and Losses: How DORA Strengthens Financial Services Firms in the EU Before It's Too Late

The Digital Operational Resilience Act (DORA) came into effect on January 17, across the EU. This new regulation aims to fortify the cyber security defences of financial services firms and their suppliers against digital threats. Understanding DORA is crucial for businesses as it unifies cyber security regulations, reducing vulnerabilities and ensuring compliance. In this blog, we'll explore what DORA entails, its key components, and its implications for both EU and UK-based financial institutions.

Reviving DevSecOps: How Snyk's new framework builds trust and collaboration

It’s been over a decade since DevSecOps was introduced as a transformative approach to software development, but adoption remains uneven. Despite its promise of seamless integration between development, security, and operations, only 38% of organizations report fully automating the addition of new projects, branches, or repositories into their security testing queues.