Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mapping and Managing AI Supply Chain Risk (Featuring Panorays)

-Recent breaches show AI risk is already present in many environments, often entering through suppliers, data flows, and integrations. But awareness alone is not enough. CISOs and security leaders must actively manage the expanded attack surface AI creates. In this session, experts from CyCognito and Panorays help you understand how to identify AI relationships, assess the risks they pose, and remediate vulnerabilities before they lead to an incident. You’ll learn.

SafeBreach's Evolution into an AI-First Development Team: Part 2

In this second installment of a series on the transformation of SafeBreach’s development organization, VP of Development Yossi Attas details a structured operational workflow that integrates Jira, BitBucket, and Claude Code to turn AI usage from ad-hoc prompting into a rigorous engineering methodology.

Why Threat Actor Context Matters for Cyber Risk Prioritization

Cyber threat intelligence is often presented as a catalog of named threat actors, past incidents, and attribution labels that promise clarity. For defenders trying to understand risk, this structure feels reassuring. It suggests that threats can be identified, tracked, and anticipated based on observed behaviors. In practice, that confidence is often overstated.

DSPM and Data Discovery: Finding and Classifying Sensitive Data at Scale

Proprietary data is the definitive differentiator in the age of AI. Models can be replicated, infrastructure can be rented, and tools can be replaced. What cannot be easily reproduced is institutional knowledge, customer insight, and strategic intent found in enterprise data. This data must be continuously identified, deeply understood, and actively protected as it changes state, location, and context.

Sovereign Cloud: Basics, Benefits, and Data Protection

Governments and regulated enterprises are pulling their most sensitive workloads out of infrastructure they can’t fully control. That’s the core driver behind sovereign cloud: cloud infrastructure where data residency, jurisdictional control, and supply-chain transparency are architectural requirements, not optional features. With GAIA-X moving into implementation and vendors like Red Hat launching sovereign support models for EU member states, adoption is accelerating fast.

ARMO Behavioral AI Workload Security

AI is not just another workload category. It is the first category of workloads that decides what to do at runtime. And that changes everything about how security must work in the cloud. For years, cloud security evolved around deterministic systems. You deploy code. That code follows defined logic paths. If something unexpected happens, such as a new process, an unusual outbound connection, or privilege escalation, you investigate and respond.

Nation-State Threat Actors Incorporate AI to Streamline Attacks

Researchers at Google’s Threat Intelligence Group (GTIG) warn that nation-state threat actors have adopted Gemini and other AI tools as essential components of their operations. The threat actors are using tools to conduct research and reconnaissance, target victims, and rapidly create phishing lures.

10 Essential Tips For Cloud Identity Management

A handful of services quietly redeploy. No one directly manages the traditional network perimeter. But somewhere along the way, an API key ends up in the wrong place. The reality of modern cloud security is that new identities are created fast, and permissions are granted broadly to keep things moving. Over time, these permissions collect unused rights and drift away from least privilege.