Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What the 2026 Verizon DBIR Reveals About the State of Application Security

Every year, the Verizon Data Breach Investigations Report sets the tone for how the industry understands the threat landscape. And every year, the most important question isn’t what’s changed — it’s whether organizations are keeping up. Based on the 2026 Verizon DBIR, the honest answer is: not fast enough.

How to Manage Risks Within Your Applications

The security landscape has fundamentally changed, and many organizations haven’t caught up. If you’re still relying on quarterly scans, annual penetration tests, or spreadsheet-based vulnerability tracking to manage risks within your applications, you’re not managing risk. You’re documenting it after the fact.

Mini Shai-Hulud: The Worm Turning CI/CD Into an Attack Surface

May 19, 2026 What the 2026 Verizon DBIR Reveals About the State of Application Security Read More Natalie Tischler May 14, 2026 How to Manage Risks Within Your Applications Read More Natalie Tischler May 12, 2026 AI Coding Tools Are Creating a Security Gap We Must Close Immediately Read More Natalie Tischler.

AI Coding Tools Are Creating a Security Gap We Must Close Immediately

Developers love AI coding tools. And why wouldn’t they? After all, they write code faster. They reduce repetitive work. They help junior engineers ship features that used to take days. But there’s a problem no one wants to talk about at the planning meeting. AI coding tools are producing insecure code at massive scale. And the industry is running out of time to fix it.

The AI Inflection Point That Will Redefine Software Trust

Every few years, something enters the market that doesn’t just change the conversation — it restructures the underlying assumptions of an entire industry. The rapid advancement of AI systems purpose-built for software and security workflows is one of those moments. And I think most of the market is still misreading what it actually means. There will be no shortage of takes. Some will declare that AI has finally “solved” software security.

The $10 Million Question: Why Are 81% of Organizations Still Getting Breached?

We are living in a security paradox. Cybersecurity budgets are increasing, security stacks are growing more complex, and yet, the needle barely seems to move. According to the newly drafted 2026 Cyberthreat Defense Report (CDR), 81% of organizations experienced at least one successful cyberattack this past year. Even more concerning, the number of organizations suffering from six or more successful attacks is actually creeping up.

6 Best Practices for Application Risk Assessments

For years, the annual penetration test or quarterly security scan served as the cornerstone of application risk assessments and application risk management. Teams would run the assessment, triage the findings, hand the report to developers, and wait for the next cycle. It felt like progress. It wasn’t.

Surviving the Vulnpocalypse: How to Prepare for the AI-Driven Security Reckoning

The cybersecurity landscape is facing an unprecedented shift, and industry experts are sounding the alarm about what many are calling the “vulnpocalypse.” This isn’t just another security buzzword or overhyped threat. It represents a fundamental transformation in how vulnerabilities are discovered, exploited, and defended against in the age of artificial intelligence.

How to Evaluate Security Tools for the Software Supply Chain

Engineering teams today face a dual mandate: ship high-quality features faster while keeping the underlying infrastructure secure. As development velocity increases, so does the complexity of the tools, libraries, and third-party components that make up your applications. The challenge? Your application’s security is now tied to a vast supply chain of code you didn’t write.

Securing GenAI Code: Manage Risk from Code to Cloud

The productivity revolution promised by AI coding assistants has arrived. Developers are shipping features faster than ever, with tools like GitHub Copilot, Amazon CodeWhisperer, and Claude Code becoming as essential to modern development as Git itself. But beneath this velocity lies a troubling reality that every security leader needs to confront: we’re scaling security debt at unprecedented speed.