Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing Full Workload Inventory Visibility in ARMO: See What's Running, What It's Doing, and How It's Protected

At ARMO, our mission is to make Kubernetes security more accessible, actionable, and effective. That’s why we’re excited to launch a major upgrade to our platform: Full Workload Inventory Visibility. This powerful new capability helps security and platform teams answer the question at the core of Kubernetes security.

EP 11 - The calm CISO: Strength under pressure

What does it take to stay calm in the face of constant cyber pressure—and why does that mindset matter more than ever? In this episode of Security Matters, host David Puner speaks with Den Jones, founder and CEO of 909Cyber, about his transition from enterprise chief security officer (CSO) to cybersecurity consultant.

Addressing Recent Vulnerabilities and Our Commitment to Security

At CyberArk, the trust and security of our customers are at the heart of everything we do. Today, July 15th, we are addressing the publication of several Common Vulnerabilities and Exposures (CVEs) related to CyberArk Secrets Manager, Self-Hosted (formerly Conjur Enterprise) and Conjur Open Source (OSS). We regret the challenges this situation may pose to our customers and reaffirm our commitment to supporting them through the resolution process.

Understanding the Core Benefits of Stablecoins for Payments and Remittance Companies

When I joined Fireblocks ten months ago, stablecoins were just starting to break into the payments conversation. Today, that conversation is everywhere. At Stablecon 2025 and in one-on-one conversations with PSPs, global marketplaces, and fintech leaders, I’ve seen the shift firsthand: stablecoins have crossed the chasm. In 2024 alone, Fireblocks infrastructure facilitated over $1.5 trillion in stablecoin transaction volume.

Inside Identity Security - A Red Team Cybersecurity Documentary by Teleport

What happens when real attackers target your infrastructure —and your team has to defend it in real time? This 24-minute cybersecurity documentary takes you inside a high-stakes Red Team vs Blue Team exercise, where Persistent Security simulates an advanced attack on Teleport’s Identity Security team. As the defenders race to detect, respond, and protect their systems, the film reveals the pressure, strategy, and human dynamics behind modern threat detection.

Hyper-volumetric DDoS attacks skyrocket: Cloudflare's 2025 Q2 DDoS threat report

Welcome to the 22nd edition of the Cloudflare DDoS Threat Report. Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of Distributed Denial of Service (DDoS) attacks based on data from the Cloudflare network. In this edition, we focus on the second quarter of 2025. June was the busiest month for DDoS attacks in 2025 Q2, accounting for nearly 38% of all observed activity.