Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The privacy illusion: when deleting your data doesn't actually delete your data

Let’s talk about privacy—specifically, the kind you thought you had when you hit “delete.” OpenAI received a court order to retain every single ChatGPT conversation, even the ones you erased. Yep. Even the awkward ones. Even the ones that start with, “Hypothetically, if I were to…” Why? Because The New York Times is suing them over copyright, and now everyone’s deleted chats are potential evidence.

Why AI Trust Will Shape Your Next Decade of Software Development

AI is often compared to electricity, but without trust, it’s just a live wire. As organizations adopt AI to move faster, reduce manual effort, and push the boundaries of what’s possible, one truth is becoming clear: trust in AI isn’t optional. It’s foundational. And for software development teams, AI Trust is now the north star that guides safe, scalable innovation.

Enhancing Safety And System Integration In Critical Facilities Using Electric Actuated Gate Valve Technology

Reliability, precision, as well as safety are non-negotiable traits for heavy-duty industrial settings like power plants, water treatment plants, chemical processing units, and oil refineries. These industries are integrating smarter systems with electric actuated gate valve technology and with assisting IoT devices. This technology is a revolutionary piece of modern infrastructure as it promises both automation as well as safety. It facilitates efficient flow control while measurably improving safety in critical environments.

Why Hosting LLMs On-Prem Doesn't Eliminate AI Risks [And What to do About It]

As AI steadily percolated into a growing number of use cases, adopting it has been a rollercoaster of confusion, chaos, and conundrums. One of the key concerns around AI adoption are the added risks. Issues like sensitive data leakage, AI hallucinations, inability to implement access control, and data breaches lurk the the cloud where LLMs are deployed.

Falcon Exposure Management ExPRT.AI: Demo Drill Down

Most vulnerability tools flood teams with static scores and long lists but ExPRT.AI changes the game by predicting what adversaries are most likely to exploit. This demo drill down shows how ExPRT.AI dynamically scores risk across asset types, network exposures, and third-party findings. You’ll see how it re-prioritizes vulnerabilities based on real-world telemetry, attacker behavior, and environmental context including a Tenable example.

Scan your AI-generated code from Cursor using Model Context Protocol (MCP)

We’re happy to announce that Cursor has validated Snyk’s CLI MCP server and added Snyk to their curated set of MCP tools from official providers. At Snyk, we recognized early on that although AI assistants accelerate development, they can inadvertently introduce vulnerable patterns, leverage outdated libraries, or even code with known security flaws. In order to maintain the rapid iteration cycles that AI enables, developers need security to be as agile as AI itself.

Building AI Trust with Snyk Code and Snyk Agent Fix

Many businesses are using AI to innovate and boost productivity. But to truly benefit from AI, you need to trust it. That's where the Snyk AI Trust Platform comes in. As we announced at the 2025 Snyk Launch, the Snyk AI Trust Platform is designed to unleash innovation, reduce business risk, and accelerate software delivery in the age of AI.

5 Multi-Cloud Environments

Multi-cloud environments have become the backbone of modern enterprise IT, offering unparalleled flexibility, scalability, and access to a diverse array of innovative services. This distributed architecture empowers organizations to avoid vendor lock-in, optimize costs, and leverage specialized functionalities from different providers. However, this very strength introduces a significant challenge: increased complexity in security management.

AI Agents Take DC: Inside Washington's Developing Agentic Security Agenda

AI Agents have become one of the most discussed emerging technologies in enterprise environments, and now, they’ve captured the attention of policymakers in Washington, DC. Over the past several weeks, a series of developments have brought AI Agents into the national spotlight, particularly through the lens of cybersecurity and regulatory preparedness.

Cursor's One-click Install MCP in Action

In this video, I’m checking out the brand new Cursor 1.0 release and testing one of its most exciting new features — the one-click MCP install. Setting up MCP servers has never been this easy! Join me as I walk through the process, share my first impressions, and see how smooth (or not) the setup really is. If you’ve been curious about Cursor or want to simplify your MCP workflows, this one’s for you.