Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ISO 42001:2023 Certification for Ethical AI Governance

ISO 42001 takes a risk-based approach and structure like other ISO standards and covers: with a focus on AI governance. Under the Annex A, it provides a list of controls, used to manage AI risks and ensure responsible deployment of AI systems. Under Annex B, it explains how to implement these controls, giving organisations the flexibility to adapt them based on their specific needs.

Egnyte on AWS Marketplace: Improve Your Procurement Efficiency

Starting today, Egnyte is available through the AWS Marketplace! Our partnership with AWS makes it easier to streamline procurement processes and maximize your technology investments. Read on to discover how our collaboration with AWS simplifies the integration of Egnyte into your existing tech stack, helping you unlock more value from your investment.

The API Security Challenge in AI: Preventing Resource Exhaustion and Unauthorized Access

Agentic AI is transforming business. Organizations are increasingly integrating AI agents into core business systems and processes, using them as intermediaries between users and these internal systems. As a result, these organizations are improving efficiency, automating routine tasks, and driving innovation. But these benefits come at a cost. AI agents rely on APIs to access data and functionality from underlying systems. Without APIs, AI agents are useless.

Ongoing TPRM Success: Continuous Security Monitoring with AI

All security professionals know third-party risk management doesn’t stop after one risk assessment. What about the next vendor? Or the future risks the vendors you’ve already evaluated will inevitably endure? While completing even a single risk assessment can feel like an arduous journey when done manually, all successful TPRM programs continue long after assessment.

Introducing Cloudflare Secrets Store (Beta): secure your secrets, simplify your workflow

Every cloud platform needs a secure way to store API tokens, keys, and credentials — welcome, Cloudflare Secrets Store! Today, we are very excited to announce and launch Secrets Store in beta. We built Cloudflare Secrets Store to help our customers centralize management, improve security, and restrict access to sensitive values on the Cloudflare platform.

Say Goodbye to SaaS Security Gaps with Cato CASB

As organizations increasingly depend on SaaS applications, IT teams struggle with visibility and governance. Shadow IT, unmanaged devices, and limited monitoring capabilities create blind spots, exposing enterprises to compliance violations, data exfiltration, and insider threats. Risks don’t come only from unsanctioned applications: even widely used SaaS platforms can become a security liability when not properly controlled.

How to Cut PCI DSS Scope and Eliminate Compliance Costs

Securing PCI and PII data is at the core of what we do at Protegrity. You can try out Protegrity’s capabilities today, through our API Playground. This section walks you through some sample scenarios of de-identifying PCI data, so that it is removed from your environment and only reversed once it leaves it. To run this example, you have to be signed up to the Protegrity API Playground.