Cloud security titan Zscaler Inc. has acquired SquareX, a pioneer in browser-based threat protection, in an apparent move to step away from traditional, Zscaler acquired SquareX to revolutionize ...
CISO AI Cybersecurity Trends 2026 Glilot Capital survey, AI security budgets, cybersecurity automation, cloud data protection, vendor consolidation.
LayerX researchers uncover a flaw in Anthropic's Claude Desktop Extensions that could lead to a RCE vulnerability if ...
An award-winning journalist, James has held top editorial roles in several leading technology publications, covering enterprise trends in cloud computing, AI, data analytics, cybersecurity and more.
There is a time window for every act of online fraud. When a transaction occurs, a fraud system must review it and decide if it’s legitimate before the ...
Microsoft just open-sourced LiteBox, an experimental library OS that rethinks sandboxing for modern workloads. Built in Rust, it aims to shrink the attack surface beyond containers without the ...
Threat actors used LLMs to accelerate their attack on a company's AWS cloud environment, needing only 8 minutes to go from initial access to full admin privileges, Sysdig researchers say. It's the ...
Seshadri, Ph.D., is the chief evangelist of Aerospike. He has spent decades building and operating business-critical infrastructure, having served as the former vice president of data and discovery at ...
Cyber Security Engineer at Everway, where she spends most of her time wrestling with IAM challenges, cloud security gaps and ...
In 2026 stolen credentials and unmanaged machine identities drive breaches—small buys, phone scams, and weak IAM make identity the real perimeter; prioritize inventory, least privilege, and stronger ...
From a security perspective, the Super Bowl isn’t entertainment. It’s a live-fire exercise. One location. Massive attack surface. Temporary infrastructure. Zero tolerance for failure. Availability, ...
Senior Director of Product and Solutions at DigiCert, where he writes about topics like email security, certificate lifecycle management, PKI, and post quantum cryptography. Mike has more than 25 ...