Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Continuous Security in the Age of AI: Moving Beyond Point-in-Time (VAPT) Testing

As AI speeds up development, traditional quarterly or annual pentests just can’t keep pace. In this session, leaders from Astra Security and ValueWave discuss how to move toward continuous security—a proactive approach that evolves with your code, your cloud, and your team. What You’ll Learn Speaker: Ujwal Ratra, COO – Astra Security Highlights: Key Takeaways Security can’t be a quarterly event - it must be continuous. Combine automation with expert validation, use AI to find real issues faster, and make every release more secure by design.

Shadow AI and the New Data Defense Paradigm: Insights from Our Data Defense Forum

Last month, we brought together some of the brightest minds in cybersecurity for our Data Defense Forum event. As someone who's been in the trenches of data security for years, I walked away from these conversations with a renewed sense of urgency and optimism about where we're headed.

CSAM Week 3: Don't Take the Phishing Bait

Phishing remains one of the most persistent cyber threats in the digital age. These attacks trick individuals into revealing sensitive information—like passwords, account numbers, or personal details—through emails, texts, or calls that appear to be legitimate.‍ Despite major advances in cybersecurity, attackers continue to refine their tactics.

API Attack Awareness: When Authentication Fails - Exposing APIs to Risk

Authentication issues seem like low-level attacks. But authentication today – especially API authentication – can be more difficult than people expect. Companies rely on APIs to carry sensitive information every day. If access to those APIs is not properly secured, all the sophisticated security solutions companies use to protect their data elsewhere are completely undermined.

Snyk Named a Leader in the 2025 Gartner Magic Quadrant for Application Security Testing

We’re thrilled to announce that Snyk has been recognized as a Leader in the 2025 Gartner Magic Quadrant for Application Security Testing (AST)! This recognition, based on our vision and ability to execute, validates our core mission: to empower developers to build securely from the start while giving security teams complete visibility and comprehensive controls.

Understanding the Colt Attack

As Jaguar Land Rover (JLR) announces a return to operations after a six-week disruption, a lengthier, less publicised UK-based cyber-attack recovery remains unresolved. Perhaps the relative quiet is because Colt Technology Services, a critical connectivity and trading network serving major banks and stock exchanges in ~30 countries, is not a household name like JLR, Co-Op, or M&S. Or perhaps it’s because the narrative doesn’t fit the now-expected Scattered Spider storyline.

Intel Chat: RediShell, Cisco 0-day, AI voice cloning, Brickstorm & teen hackers arrested [256]

Intel Chat - Episode 256: RediShell, Cisco 0-day, AI voice cloning, Brickstorm & teen hackers arrested A podcast about cybersecurity and the people that keep the internet safe. New episodes drop weekly. Chris and Matt dive into critical vulnerabilities, sophisticated threat actors, and emerging attack vectors. From a 13-year-old Redis vulnerability with active exploitation to China-linked espionage targeting infrastructure blind spots, this episode covers some of the most significant security developments impacting organizations today.

A CISO's Guide to the DoW's New CSRMC Framework

The Department of War’s (DoW) new Cybersecurity Risk Management Construct (CSRMC) marks a watershed moment for cyber defense. This move confirms that static, checklist-based security is obsolete. To defend against modern threats, organizations must adopt the continuous and proactive posture management approach experts have been recommending for years.