Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Scaling Your Security Program to Match the Speed of Mythos

Anthropic’s Project Glasswing and the Claude Mythos model represents a fundamental change in the physics of cyber defense. With the gap between patch releases and weaponized exploits shrinking to hours, traditional manual security triage is now obsolete. Organizations must adopt AI-driven automated remediation.

Can AI Replace a QSA?

The question circling boardrooms and compliance departments in 2026 is no longer hypothetical: Can AI replace a QSA? After nearly two decades guiding organizations through PCI DSS audits, gap assessments, and remediation programs, the answer is clear — No, AI cannot replace a Qualified Security Assessor in 2026. But it is fundamentally reshaping what being a QSA means, and professionals who ignore that shift do so at their own peril.

You proved the value, finance is backing the growth: bringing Story copilot into the AI credit framework

It was a bold move, but our finance team was fully on board. They both approved and championed the approach. They wanted to see exactly how much value we could unlock for our customers. They didn't look at the resulting bill and ask us to slow down.

The Agentic MDR Pipeline: Detection Engineering at Scale

A CVE surfaces in the morning. By the time you are talking to that customer, you can tell them: we saw it, we checked your environment, you were not affected, and we deployed a rule that will catch it if it ever shows up. For MSSPs and MDR providers, detection engineering is among the most valuable services you can offer. It is also among the most expensive to deliver consistently and at scale.

Agents Need Boundaries. The Market Is Starting to Agree.

Gartner published the inaugural Hype Cycle for Agentic AI last week (and yes, we’re included in two subcategories - Agentic AI Security and Guardian Agent). A few things worth noting. It's inaugural, Gartner publishes over 130 Hype Cycles a year, and standing up a new one signals that a space has earned its own map. And it dropped in April, months ahead of the June - August window when these things usually appear.

Understanding shadow AI in your endpoint environment

Generative AI–and large language models in particular–reached mass consumer adoption beginning in late 2022 and early 2023, with ChatGPT reaching 100 million users faster than any consumer application in history. Since then, AI has advanced at a breakneck pace and now seems to be incorporated in every tool, app, and website–regardless of how useful it might actually be.

Best Enterprise DLP Tools for AI Data Risk (2026 Comparison)

Employees move sensitive data into AI tools every day. Someone pastes customer records into ChatGPT to draft an email. A developer feeds proprietary source code into a coding assistant to fix a bug. A project manager drops a confidential contract into Gemini to summarize it for a meeting. According to research from Cyberhaven Labs, 39.7% of the data employees share with AI tools is sensitive, and enterprise adoption of endpoint-based AI agents grew 276% in the past year alone.

7 Generative AI Security Risks and How to Defend Your Organization

Generative AI creates new attack surfaces that traditional security tools were not designed to address. The biggest generative AI security risks include prompt injection, data leakage, shadow AI, compliance exposure, model poisoning, insecure RAG pipelines, and broken access control. Each one requires a specific defense, not a generic firewall or DLP rule.

Understanding Cloudflare's network architecture

For decades, enterprise IT relied on a “hub and spoke” security model. But between the explosion of cloud infrastructure, SaaS apps and a remote workforce, that old perimeter hasn't just cracked—it’s shattered. In an attempt to stay on top of the advancing perimeter, many different solutions from many vendors entered the market and created a "spaghetti mess" of point solutions that drive up costs and tank user experience. Cloudflare is an answer to this problem, delivering everything you need to secure your apps, networks, users, data and devices.