Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Navigating the Agentic AI Era: Forward's Perspective from Cisco Live EMEA

Cisco Live EMEA 2026 Amsterdam has officially wrapped up, and the path forward is clear: we have entered the Agentic AI Era. The event was centered around an industry shift towards a unified platform where AI agents don't just respond; they act. At Forward Networks, we aren’t just watching this shift happen; we are providing the foundation required to make it a reality.

Is Google Drive Safe for Your Private Files?

Google Drive is the most popular cloud storage solution in the market with over 2 billion users worldwide. Despite this, due to recent concerns and more interest in online privacy, more people are asking is Google Drive safe for their files, photos, and videos. Of course, Google Drive and Google One offer advanced security and privacy features, but it falls short in privacy.

How Passkey Management Works in Keeper

Keeper’s passkey management works by letting you create, store and use passkeys directly from your Keeper Vault so you can sign in with biometric or device-based authentication instead of traditional passwords. By removing shared secrets and replacing them with cryptographic credentials tied to your device, Keeper makes signing in faster, more secure and resistant to phishing attacks.

LevelBlue Named a Representative Vendor in 2026 Gartner Market Guide for Outsourced Managed Security Services

LevelBlue is proud to announce it has been named a Representative Vendor in the just-released 2026 Gartner Market Guide for Outsourced Managed Security Services (OMSS). OMSS, which is a subset of Managed Security Services, provides organizations with specialized external expertise and operational support for critical cybersecurity functions.

EP25 - Identity is the attack vector w/ Udi Mokady

CyberArk founder and executive chairman Udi Mokady returns to Security Matters at a transformational moment—now as part of Palo Alto Networks, following the acquisition’s close on February 11. In this far‑reaching conversation, Udi and host David Puner explore why identity has become the attack vector for modern enterprises, driven by an unprecedented surge in human, machine and AI‑powered identities that attackers increasingly exploit.

G2 Names Feroot a 2026 Best Software Product in Data Privacy

We’re excited to share that Feroot has been named one of G2’s Best Software Products of the Year for 2026 in the Data Privacy category. This recognition is especially meaningful because it’s based on direct customer feedback. G2’s awards are powered by real-world reviews and outcomes, and we’re honored that customers chose to share their experience with Feroot. Even more humbling: our customers have given us an average rating of 4.9 out of 5 stars.

Access control in cybersecurity

Access control defines who can access data and systems across an IT environment and under what conditions. Common models include DAC, MAC, RBAC, and ABAC, each supporting different governance and risk requirements. Strong access control depends on MFA, least-privilege enforcement, continuous audits, and clear visibility into sensitive data.

Rethinking data governance and global compliance

Across Europe and beyond, regulatory frameworks are reshaping how and where organizations manage data. These laws establish enforceable standards for data sovereignty, data governance, and data privacy that directly influence cloud architecture, security strategy, and AI innovation. Without these regulations, you run the risk of these organizational consequences: Data management shouldn’t be considered as only a task for IT. It’s a board-level priority.