Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is AI Context Security?

Every enterprise wants to use AI on its most valuable data — customer records, financial documents, clinical notes, legal files, engineering IP. The problem is simple: the moment that data enters an AI workflow, traditional security stops working. Firewalls protect the network. Encryption protects data at rest. Access controls protect the database. But none of them protect what happens when an AI agent retrieves five documents, synthesizes an answer, and delivers it to a user.

Multiple Cross-Site Scripting (XSS) Vulnerabilities in Mailcow

Mailcow is a widely used self-hosted and open source email server that hosts everything you'd need to manage mailboxes yourself. To assess its security, we set up a local instance and ran our AI pentesting agents against it. We found three XSS vulnerabilities, including a critical vulnerability that allowed unauthenticated attackers to take over administrator accounts while looking at their logs in the UI. Gaining access to a mailbox can have a serious security impact.

Navigating the Post-Mythos Landscape with Bitsight

The rise of AI-driven vulnerability discovery using Anthropic's Claude Mythos, as well as similar tools from Google and OpenAI, is completely changing the calculus of cyber risk. The number of vulnerabilities is exploding. The time it takes for exploits to appear is shrinking. The patching cadences and scan intervals, assessments and risk registers that many organizations still rely on are rapidly becoming ineffective.

NIST CSF 2.0: What's new in the Cybersecurity Framework

NIST CSF 2.0 expands the Cybersecurity Framework into a broader, risk-based model centered on governance, making leadership accountable for cybersecurity as an enterprise risk. It introduces a sixth core function, enhances supply chain and privacy integration, and improves usability for organizations of all sizes. Profiles, tiers, and new implementation resources help align security efforts with business objectives and evolving threat landscapes.

Cybersecurity AI Explained: Agentic AI, PQC, and Real-World Security Challenges

At the 2025 RSA Conference, Justin Foster joins Zeus Kerravala to break down where AI in cybersecurity is actually delivering value and where it’s falling short. As security teams deal with growing complexity, many are finding that today’s AI tools create as much friction as they solve. This conversation explores how a shift toward agentic, skills-based AI can help teams move faster, reduce noise, and focus on what really matters.

Announcing Approval Escalation: Stop Letting Stalled Approvals Block Your Team

Today, we’re introducing Approval Escalation, a new capability in Apono that automatically moves access requests forward when the original approver doesn’t respond in time. Because no one should be stuck waiting seven hours just to do their job.

Drilling vs Boring: Key Differences That Impact Precision

When you first step into the world of machining, it's easy to assume that all hole-making processes are basically the same. A hole is a hole, right? Not quite. If you've ever had a part fail tolerance checks or struggled with surface finish issues, you already know that the details matter. That's where the debate of drilling vs boring comes in. These two processes may look similar on the surface, but they serve very different purposes in real-world manufacturing. Choosing the wrong one can cost time, money, and even your reputation.