Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Zenity Joins the Microsoft Security Store: Securing AI Agents Everywhere, Together

We’re thrilled to share that Zenity is included in the unveiling of the Microsoft Security Store Partner Ecosystem. The Security Store is a new marketplace offering from Microsoft that brings together trusted, curated security solutions and AI agents to help organizations navigate the evolving landscape of cybersecurity in the age of AI. The Microsoft Security Store is a strategic leap forward in how security teams discover, deploy, and operationalize technologies that protect their environments.

Securing The Future: Cloudflare's Implementation of Post-Quantum Cryptography - Michiel Appelman

Explore how Cloudflare’s Post-Quantum Cryptography (PQC) capabilities are future-proofing enterprise security. Learn how we’re integrating PQC across our network to safeguard data against quantum threats, ensuring businesses stay protected in an evolving cryptographic landscape—without compromising performance or scalability.

Vanta signs a strategic collaboration agreement with AWS to deepen integration

We’re thrilled to announce that Vanta has signed a strategic collaboration agreement (SCA) with Amazon Web Services (AWS) to make it even easier for businesses to scale securely in the cloud. We’re expanding the reach of our compliance automation and trust management platform, enabling organizations to build stronger security programs, accelerate audit readiness, and demonstrate compliance more efficiently—all while scaling on AWS. ‍

AI security posture management (AI-SPM): All information in one place

As AI adoption grows, so do the related risks. Organizations are actively looking for strategies to secure their AI systems. According to Vanta’s State of Trust Report, 62% of organizations plan to boost investments in AI security in the next 12 months. ‍ However, another recent survey on AI governance reveals that more than half of organizations find it challenging to keep up with AI security developments.

Elastic Security Explained: Transparency, AI, and the Future of Threat Hunting

Elastic’s James Spiteri joins John Hammond to dive deep into the evolution of Elastic Security, from the ELK stack’s early days to today’s full-fledged, unified SIEM, XDR, and cloud security solution powered by agentic AI and automation. They discuss free tools, open detections, and how Elastic is making cybersecurity more accessible and collaborative for everyone.

LevelBlue Managed WAAP Enables Organizations to Solve Day 1 WAAP Implementation Challenges

Deploying Web Application and API Protection (WAAP) systems is crucial for bolstering cybersecurity defenses. Akamai reported 108 billion API attacks over an 18-month period, underscoring the value of APIs to cybercriminals. Like any new security measure, the initial deployment brings various challenges during the "Day One" process. These Day One challenges should not compromise security effectiveness or disrupt business operations.

CTEM Solutions Explained How to Build a Stack

Vulnerability numbers are spiraling. Compliance checklists and point scans cannot keep pace. Continuous Threat Exposure Management (CTEM) provides security leaders with a practical approach to identify and mitigate real attack paths in real-time. This article explains what CTEM is, the solutions that enable it, and how to build a stack that actually shrinks exposure instead of counting it. CTEM solves the eternal problem of vulnerability management (too many vulnerabilities to ever fix) with a continuous program to find, validate, and reduce exposures before adversaries can use them.

CTI Roundup: SystemBC, ShinyHunters, AI-obfuscated Phishing

This week, Tanium’s Cyber Threat Intelligence (CTI) team investigates SystemBC, a large-scale proxy botnet that’s leveraging compromised virtual private server (VPS) infrastructure to support cybercriminal operations, including ransomware and credential theft. Next, the team looks at ShinyHunters—a financially motivated data extortion group that’s now targeting enterprise cloud applications.

AI Code Review in 2025: Technologies, Challenges & Best Practices

AI code review leverages artificial intelligence models and machine learning techniques to analyze and provide feedback on source code, automating and improving the traditional code review process. It is crucial for software development workflows, offering significant advantages to developers and teams. AI code review can scan for bugs, style violations, security vulnerabilities, and other issues.