Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Feature Request Portal - Tanium Tech Talks #147

We want to hear your feature requests. Find out how on today's Tanium Tech Talk. Send feedback directly to our Product Management team Suggest and vote on product feature requests and enhancements Help determine what we implement and how we prioritize Use your Tanium Titans user community login To explore the Tanium Feature Request Portal, go to community.tanium.com, login, and look for the Product Ideas button.

We Asked AI Security Experts to Explain Their Work Using Emojis #AISecurity #AI #AppSec

Can you explain AI Security using only emojis? We challenged AI Security professionals to do just that — no words, just symbols. Their creative combos reveal how experts really think about risks, models, and protection in today’s AI-driven world. From to to , each emoji tells a story about securing the systems behind the world’s most powerful models. Subscribe for more creative takes on AppSec, AI Security, and secure development from the Mend.io team.

The Howler Episode 25 - Susan Corcoran, Chief Accounting Officer

This month, we sit down with Susan Corcoran, Chief Accounting Officer, as she unpacks common misconceptions about accounting, takes us on her journey from Minnesota dairy farm to London then back to Minnesota, and so much more! With nearly two decades of experience, spanning Deloitte and United Health Group, Susan Corcoran has led everything from SEC reporting to global accounting strategy. Now she's steering Arctic Wolf's financial integrity and compliance at the highest level as Chief Accounting Officer.

SecurityScorecard CEO Dr. Aleksandr Yampolskiy 2026 Predictions for Supply Chain Cybersecurity

It's that time of year again for SecurityScorecard 2026 predictions. CEO and co-founder of SecurityScorecard Dr. Aleksandr Yampolskiy shares his predictions for how CEOs will rethink supply chain cybersecurity in 2026. We have seen supply chain breaches take over the headlines and cyber risk is becoming more than just a TPRM & IT issue and is becoming a bigger boardroom issue.

OWASP Top 10 for Agentic Applications 2026: Key Takeaways & How to Take Action

AI agents connect to APIs, execute code, move data, and make decisions with real permissions in live production environments — introducing a new class of security risks. To help organizations stay ahead, the OWASP GenAI Security Project released the OWASP Top 10 for Agentic Applications 2026. In this post, we’ll provide a summary of each agentic AI risk category defined by OWASP, along with actionable next steps to begin securing your agentic AI projects in 2026 and beyond.

5 fraud and identity experts on 2025-2026 trends

As with previous years, we asked identity and fraud experts to reflect on the closing year and share a few predictions for the next. You’ll get unique perspectives from fraud fighters, researchers, and an executive. We asked them about unexpected fraud trends, which tactics will become more valuable, leadership’s changing perceptions, and AI, of course. But we kicked things off with a lighthearted question.

Arctic Wolf Observes Malicious SSO Logins on FortiGate Devices Following Disclosure of CVE-2025-59718 and CVE-2025-59719

In December 12, 2025, Arctic Wolf began observing intrusions involving malicious SSO logins on FortiGate appliances. Fortinet had previously released an advisory for two critical authentication bypass vulnerabilities (CVE-2025-59718 and CVE-2025-59719) on December 9, 2025. Arctic Wolf had also sent out a security bulletin for the vulnerabilities shortly thereafter.

2025 cloud security roundup: How attackers abused identities, supply chains, and AI

In 2025, many of the long-standing cloud security concerns remained, but new areas of focus also developed. The significant increase in AI adoption enabled organizations to deliver features faster but also introduced new attack surfaces, such as untrusted or unpredictable user input for large language model (LLM) applications. At the same time, long-lived credentials and vulnerabilities in third-party packages continued to expose cloud environments to risk.

How To Protect Non-Human Identities (NHIs)

Non-human identities have become one of the most overlooked yet exploited attack surfaces in the modern enterprise. NHIs are entities that interact with systems and services but are not tied to a physical user. As organizations expand across hybrid and multi-cloud environments, thousands of machine-based identities are silently running critical operations, yet most are unmanaged, invisible and vulnerable to abuse.