Cloudflare has added new capabilities to its zero trust platform Cloudflare One to help organizations securely adopt, build, and deploy generative AI applications. According to Cloudflare, employees are using AI for numerous tasks, from writing code to generating marketing copy to summarizing confidential documents. Unfortunately, generative AI interactions can involve sending company data to these … continue reading
SailPoint, an enterprise identity security company, is introducing a new solution to help organizations discover, govern, and secure their growing number of applications. SailPoint Accelerated Application Management provides continuous application discovery to uncover inventory, ownership, user activities, and risky access patterns. According to the company, this visibility enables IT teams to identify high-risk applications, prioritize … continue reading
LightBeam.ai has announced its Summer 2025 product release, which adds new features to help enterprises secure Microsoft Copilot usage. Companies will be able to monitor Copilot prompts, responses, and file access to ensure that sensitive data is being properly safeguarded. It will be able to access all documents that are referenced, including Excel workbooks, CSV … continue reading
Bugcrowd has announced two new products for helping IT and security teams remediate vulnerabilities more quickly. The first, AI Connect, is like a read-only “front door” for vulnerability data, Bugcrowd said. It allows customers to integrate Bugcrowd vulnerability data into their preferred internal AI stacks. Under the hood, it is built upon MCP to enable … continue reading
The security company SpecterOps has announced the release of the latest version of its open source Attack Path Management tool BloodHound. BloodHound allows companies to uncover hidden or unintended relationships in Active Directory, Entra, and Azure so that they can map potential attack paths. The latest release, version 8.0, introduces BloodHound OpenGraph, which will allow … continue reading
Critical vulnerabilities were exploited in some on-premises Microsoft SharePoint installations over the weekend. Ronen Ahdut, head of CyOps MDR at Cynet Security, explained that there were two vulnerabilities involved: CVE-2025-53770 and CVE-2025-53771. CVE-2025-53770 relates to deserialization of untrusted data, and can be remotely exploited without authentication. CVE-2025-53771 relates to improper input validation, and enables a … continue reading
Agentic AI has enormous potential to add efficiency and speed to legacy system transformation. However, given the complexity of legacy platforms and their critical role in enabling business processes, fully leveraging AI agents to assist with legacy system migration and modernization can be a deeply challenging task. Fortunately, these issues are solvable. They do, however, … continue reading
KnowBe4, a security training platform, is sharing five strategies organizations should take to avoid phishing scams. According to recent research from the company, between November 2024 and February 2025 there was a 57.7% increase in successful phishing attacks. Since phishing attacks target humans, it’s important to properly train employees to avoid them. Here are five … continue reading
Contrast Security has announced the launch of Northstar, a security platform update that brings developers, security, and operations teams together to address app security in a more unified way. “We’re calling this release Northstar because it points the way forward. It helps customers see what was once invisible — adding clarity where there was ambiguity, … continue reading
Cisco has announced a new security offering to combat identity threats, which the company says are increasing in frequency as a result of AI. The company’s 2025 Cybersecurity Readiness Index found that almost a third of companies rank identity as their top cybersecurity challenge. “The security industry is facing an ‘identity crisis’ as persistent identity-based … continue reading
DefectDojo has announced the release of new Security Operations Center (SOC) capabilities in DefectDojo Pro. According to the company, with this update, the platform now acts as a unified platform for both SOC and AppSec teams. It brings together SOC alerts and AppSec findings and has features that aim to cut down on alert noise … continue reading
The Linux Foundation and Open Source Security Foundation (OpenSSF) have announced the Cybersecurity Skills Framework, designed to help organizations identify their security competencies across several areas that are important to reducing cybersecurity risk. “This framework is a valuable tool for CIOs, CISOs, and enterprise learning teams,” said Clyde Seepersad, SVP and general manager of Linux Foundation … continue reading