Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Falcon for IT Visibility + Response: Demo Drill Down

In today's rapidly evolving IT landscape, organizations need comprehensive visibility and immediate response capabilities to maintain operational resilience and security compliance. CrowdStrike's AI-native Falcon for IT empowers teams with real-time detection, automated remediation, and enterprise-wide control through a unified platform—transforming how organizations identify, respond to, and resolve critical IT challenges at scale.

Uncovering Cyber Risks in the Global Supply Chain

No organization can achieve its goals on its own. To truly get ahead in the rapidly transitioning digital society, any organization will need a diverse group of partners who specialize in the products and services they do not. Commonly referred to as a “supply chain” this web of connections ensures the world operates smoothly, but navigating its many connections is challenging. Luckily, Bitsight TRACE doesn’t shy away from a challenge.

Reconstructing the TJ Actions Changed Files GitHub Actions Compromise

In the afternoon on Friday, March 14, 2025, details began to emerge about a serious security exploit on a popular GitHub Action called changed files (tj-actions/changed-files). About 23,000 GitHub repos use this Action as part of their CI and DevOps workflows. It allows you to track which files have changed across branches and commits. An attacker with write privileges on the Action repo made a commit that caused encrypted secrets to appear in plaintext in the GitHub Action logs.

Enhanced security and simplified controls with automated botnet protection, cipher suite selection, and URL Scanner updates

At Cloudflare, we are constantly innovating and launching new features and capabilities across our product portfolio. Today, we're releasing a number of new features aimed at improving the security tools available to our customers. Automated security level: Cloudflare’s Security Level setting has been improved and no longer requires manual configuration.

Password reuse is rampant: nearly half of observed user logins are compromised

Accessing private content online, whether it's checking email or streaming your favorite show, almost always starts with a “login” step. Beneath this everyday task lies a widespread human mistake we still have not resolved: password reuse. Many users recycle passwords across multiple services, creating a ripple effect of risk when their credentials are leaked.

How UK businesses are managing risk and compliance with automation

Trust is critical to the success of every business. But building, scaling and demonstrating trust is getting harder for UK organisations. ‍ Vanta’s second annual UK State of Trust Report uncovers key trends across these areas of security, compliance and the future of trust. Surveying 1,000 business and IT leaders in the UK, our research found that more than half (54%) of UK organisations say that security risks for their business have never been higher. ‍