Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Inside the Architecture of a Deep Research Agent

In the rapidly evolving landscape of AI, Retrieval-Augmented Generation (RAG) has become the go-to solution for grounding language models in factual data. It has been effective for question-answering, but for complex, exploratory tasks that demand vast data analysis and culminate in a structured narrative, we must look beyond simple RAG. This isn’t just a theoretical challenge, it's the next step in our own product journey: This progression now culminates in a more advanced capability.

Gartner's 2025 Guide to Buying AppSec Tools & 5 Mistakes to Avoid

Choosing the wrong AST (Application Security Testing) platform doesn't just waste your budget. It leads to: In its latest research, “How to Avoid Common Pitfalls in Selecting Application Security Testing Tools,” Gartner highlights the five most common mistakes security leaders make when evaluating AST platforms. In this blog, we break down Gartner’s key insights and share what teams should look for when choosing a tool that works in the real world.

Elevating Your Experience: TMU 770 Release Brings Enhanced Reporting, Security, Control, and Performance

We’re excited to announce the release of TMU 770, packed with over 370 new features and enhancements across Windows Agent 25.28, Mac Agent 25.24, Web 25.30.1, Server 25.28, and BI 25.28. This release focuses on bolstering security, giving you greater control over your monitoring, and optimizing performance across the platform. Here’s a summary of what’s new and improved in TMU 770.

Intergrating Secure Lifecycle into DevOps for PCI DSS Compliance

SLC refers to the entire process of developing and maintaining software, encompassing various stages like planning, design, development, testing, deployment, and maintenance. The average cost of a data breach in the financial sector is approximately $5.85 million. Incorporating security into DevOps can significantly reduce these costs by preventing breaches early. Around 73% of organizations have adopted DevSecOps practices to embed security into their DevOps pipelines.

Protect your Organization with Netwrix Data Security Posture Management

Would your team know if a hacker was moving through your systems right now? 45% of data breaches involve cloud-based data, often due to poor visibility and weak security posture. Every day, attackers exploit blind spots in data discovery, classification, and monitoring—gaining access to critical information undetected. Netwrix Data Security Posture Management (DSPM) puts an end to that. Ready to take control of your data security posture?

AI and Compliance: Preventing Personally Identifiable Information Leakage

AI and Compliance: Preventing PII Information Leakage In this video, A10 Networks' security leaders, Jamison Utter, Madhav Aggarwal, and Diptanshu Purwar, delve into the growing security risks associated with the adoption of conversational AI bots and Large Language Models (LLMs), particularly in sensitive fields such as healthcare. Diptanshu Purwar highlights several key concerns.

Creating an MCP Server in Tines

MCP servers in Tines allow you to create custom AI tools and connectors using the new MCP server action template. Integrating Tines and MCP streamlines incident response and workflow automation, enhancing efficiency and security operations by enabling seamless communication and data integration between systems. New to Tines? Sign up for our always-free Community Edition and start building right away.

Introducing Apono's AI-Powered Access Assistant: Smarter Access Starts with a Conversation

Today we’re excited to announce the launch of Apono’s new AI-powered Access Assistant, now live across the Apono Cloud Access Management Platform. As AI continues to transform engineering and security workflows, this assistant brings natural language interaction to access management. Helping teams move faster while staying secure. By eliminating the guesswork from access requests, Apono’s Access Assistant gives engineers a powerful new way to get exactly the access they need.