Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mobile Threat Report Briefing

In this video, David Richardson, Product CTO at Lookout, provides a strategic overview of the evolving mobile threat landscape based on Q3 2025 global enterprise data. Key Insights: Dominant Attack Vectors: Mobile phishing and social engineering remain the most significant threat categories. Attackers are increasingly using AI-powered tools to craft authentic-looking messages and conduct deep research for highly targeted attacks.

Everyone is Deploying AI Agents. Almost Nobody Knows What They're Doing

AI agents are operating inside your enterprise; querying databases, triggering workflows, and taking action through APIs. As AI agents are adopted, organizations cannot see, track, or control what these agents are actually doing. In this session, Roey Eliyahu, Co-Founder and CEO of Salt Security, challenges the industry’s narrow focus on LLM safety and exposes the much larger, invisible attack surface created by agentic systems.

Using Agentic AI to Scale Threat Detection in Healthcare

For every human in a healthcare organization, there are 82 machine identities—service accounts, API keys, cloud functions, medical devices.2 That's the 82:1 ratio, and it means your team is fundamentally outnumbered. The Change Healthcare breach in 2024, which started with one unprotected Citrix credential and disrupted 40% of US claims processing,1 showed exactly what happens when that ratio goes unmanaged. The numbers back this up.

How we built Organizations to help enterprises manage Cloudflare at scale

Cloudflare was designed to be simple to use for even the smallest customers, but it’s also critical that it scales to meet the needs of the largest enterprises. While smaller customers might work solo or in a small team, enterprises often have thousands of users making use of Cloudflare’s developer, security, and networking capabilities. This scale can add complexity, as these users represent multiple teams and job functions.

What Is AI Data Exfiltration and How Do You Stop It?

AI adoption does not happen uniformly across an organization. Some employees have integrated generative AI (genAI) tools into core parts of their workflow. Others have barely opened one. Most are somewhere in between, experimenting on an ad hoc basis, without consistent visibility into what data those tools handle or where it goes. That variance is the problem. Security programs built around either universal AI adoption or zero AI adoption will miss most of the actual risk.

Q1 at AlgoSec: What innovations and milestones defined our start to 2026?

As we close out the first quarter of 2026, I find myself reflecting on a start to the year that was defined by product momentum, stronger market validation, growing trust from regulated organizations, and meaningful industry recognition. In just three months, AlgoSec introduced important platform enhancements, published fresh research on where network security is heading, strengthened its standing with government and highly regulated customers, and closed the quarter with three major awards.

How Minimal Container Images Are Reshaping the Fight Against CVE Exposure in Modern Cloud Environments

As the adoption of containers grows across Cloud infrastructure, Cybersecurity experts and DevSecOps leaders continue to deal with the persistent surge of publicly available software vulnerabilities. The National Vulnerability Database documented an alarming figure of 29,000 CVEs for 2023, and the numbers since then show no signs of slowing down. Research shows that the majority of production container images have known vulnerabilities. This article explores the relationship between container images and CVE vulnerabilities (exposure), the growing burden of compliance, and the target risk reduction of minimal-image strategies.