Topic: security

Cloudflare One gets new capabilities to secure Shadow AI

Cloudflare has added new capabilities to its zero trust platform Cloudflare One to help organizations securely adopt, build, and deploy generative AI applications. According to Cloudflare, employees are using AI for numerous tasks, from writing code to generating marketing copy to summarizing confidential documents. Unfortunately, generative AI interactions can involve sending company data to these … continue reading

SailPoint Accelerated Application Management facilitates application governance at scale

SailPoint, an enterprise identity security company, is introducing a new solution to help organizations discover, govern, and secure their growing number of applications. SailPoint Accelerated Application Management provides continuous application discovery to uncover inventory, ownership, user activities, and risky access patterns. According to the company, this visibility enables IT teams to identify high-risk applications, prioritize … continue reading

LightBeam.ai provides monitoring for sensitive data usage in Microsoft Copilot with latest updates

LightBeam.ai has announced its Summer 2025 product release, which adds new features to help enterprises secure Microsoft Copilot usage. Companies will be able to monitor Copilot prompts, responses, and file access to ensure that sensitive data is being properly safeguarded. It will be able to access all documents that are referenced, including Excel workbooks, CSV … continue reading

Bugcrowd launches new products for speeding up vulnerability remediation

Bugcrowd has announced two new products for helping IT and security teams remediate vulnerabilities more quickly. The first, AI Connect, is like a read-only “front door” for vulnerability data, Bugcrowd said. It allows customers to integrate Bugcrowd vulnerability data into their preferred internal AI stacks. Under the hood, it is built upon MCP to enable … continue reading

Latest BloodHound release enables ingestion of data from third-party system for more comprehensive attack path mapping

The security company SpecterOps has announced the release of the latest version of its open source Attack Path Management tool BloodHound.  BloodHound allows companies to uncover hidden or unintended relationships in Active Directory, Entra, and Azure so that they can map potential attack paths.  The latest release, version 8.0, introduces BloodHound OpenGraph, which will allow … continue reading

Critical vulnerabilities in on-premises Microsoft SharePoint servers exploited in the wild

Critical vulnerabilities were exploited in some on-premises Microsoft SharePoint installations over the weekend.  Ronen Ahdut, head of CyOps MDR at Cynet Security, explained that there were two vulnerabilities involved: CVE-2025-53770 and CVE-2025-53771.  CVE-2025-53770 relates to deserialization of untrusted data, and can be remotely exploited without authentication. CVE-2025-53771 relates to improper input validation, and enables a … continue reading

Applying agentic AI to legacy systems? Prepare for these 4 challenges

Agentic AI has enormous potential to add efficiency and speed to legacy system transformation. However, given the complexity of legacy platforms and their critical role in enabling business processes, fully leveraging AI agents to assist with legacy system migration and modernization can be a deeply challenging task. Fortunately, these issues are solvable. They do, however, … continue reading

KnowBe4 shares five key strategies to follow to avoid phishing scams in the enterprise

KnowBe4, a security training platform, is sharing five strategies organizations should take to avoid phishing scams.  According to recent research from the company, between November 2024 and February 2025 there was a 57.7% increase in successful phishing attacks. Since phishing attacks target humans, it’s important to properly train employees to avoid them. Here are five … continue reading

Contrast Security’s Northstar unifies app security for developers, security, and operations

Contrast Security has announced the launch of Northstar, a security platform update that brings developers, security, and operations teams together to address app security in a more unified way.  “We’re calling this release Northstar because it points the way forward. It helps customers see what was once invisible — adding clarity where there was ambiguity, … continue reading

Cisco Duo IAM launches to address identity threats

Cisco has announced a new security offering to combat identity threats, which the company says are increasing in frequency as a result of AI. The company’s 2025 Cybersecurity Readiness Index found that almost a third of companies rank identity as their top cybersecurity challenge. “The security industry is facing an ‘identity crisis’ as persistent identity-based … continue reading

DefectDojo unifies SOC and AppSec capabilities in latest platform update

DefectDojo has announced the release of new Security Operations Center (SOC) capabilities in DefectDojo Pro. According to the company, with this update, the platform now acts as a unified platform for both SOC and AppSec teams. It brings together SOC alerts and AppSec findings and has features that aim to cut down on alert noise … continue reading

Linux Foundation and OpenSSF launch Cybersecurity Skills Framework

The Linux Foundation and Open Source Security Foundation (OpenSSF) have announced the Cybersecurity Skills Framework, designed to help organizations identify their security competencies across several areas that are important to reducing cybersecurity risk.  “This framework is a valuable tool for CIOs, CISOs, and enterprise learning teams,” said Clyde Seepersad, SVP and general manager of Linux Foundation … continue reading

1 2 3 29
DMCA.com Protection Status

Get access to this and other exclusive articles for FREE!

There's no charge and it only takes a few seconds.

Sign up now!