Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why 75%+ of Enterprises Admit They Can't Secure Their Non-Human Identities

Security teams are losing the battle to secure non-human identities (NHIs) for one simple reason: machine identities are now created inside the systems that ship software. They appear in CI/CD pipelines, Kubernetes workloads, SaaS integrations, and AI-driven workflows faster than central IAM teams can inventory or review them.

Detection Engineering with LimaCharlie and Claude Code

Detection engineering is fundamentally a translation problem: rules need to be converted between formats, IOCs need to be converted into detection logic, and noisy alerts need to be converted into precise suppressions. That translation work is what consumes analyst time, and it's what Claude Code handles well.

System Prompts Are Not Security Controls: A Deleted Production Database Proves It

On April 25th, a Cursor AI coding agent running Anthropic's Claude Opus 4.6, one of the most capable models in the industry, deleted the production database for PocketOS, a software platform used by car rental businesses across the country to manage their entire operations. The deletion took 9 seconds.

Beyond Detection: What a National Cyber Drill Reveals About True Cyber Resilience

In today’s threat landscape, cybersecurity is no longer defined by the ability to detect and respond to isolated incidents. It is defined by how organizations perform under pressure, when faced with coordinated, AI-enabled, multi-vector attacks that test not only technology, but leadership, governance, and trust. Recently, Obrela had the opportunity to support a national-level cyber security drill in Qatar, working alongside our partner ecosystem.

From pilot to Moderate: Lessons from Vanta's FedRAMP 20x journey

Accelerating security solutions for small businesses‍ Tagore offers strategic services to small businesses. A partnership that can scale‍ Tagore prioritized finding a managed compliance partner with an established product, dedicated support team, and rapid release rate. Standing out from competitors‍ Tagore's partnership with Vanta enhances its strategic focus and deepens client value, creating differentiation in a competitive market. Vanta is now FedRAMP 20x Moderate authorized. ‍

Navigating the New VMware Reality: What Broadcom's Changes Mean for Your Business

When Broadcom completed its $69 billion acquisition of VMware in November 2023, most customers assumed the initial disruption would settle. Licensing models would stabilise. Partner programmes would find a new equilibrium. Pricing would normalise. Two years in, it’s clear that didn’t happen.

LevelBlue Recognized at Intelligent Insurer's Cyber Insurance Awards US 2026

LevelBlue is proud to be named at the Intelligent Insurer Cyber Insurance Awards US 2026, earning Cyber Security Consulting Services Provider of the Year and being recognized as Highly Commended for the Cyber Security Solution Provider of the Year. These recognitions reflect the continued evolution of the cybersecurity landscape and the growing importance of strong collaboration between insurers, enterprises, and security providers.

The ABCs of KYT: How this key process combats payment fraud

Banks, payment processors and fintechs have long relied on Know Your Customer (KYC) processes to verify identity and assess the risk of doing business with the customer during onboarding, and on Know Your Business (KYB) processes to validate business legitimacy. But today, that’s no longer enough.

Shutdowns, power outages, and conflict: a review of Q1 2026 Internet disruptions

In the first quarter of 2026, government-directed shutdowns figured prominently, with prolonged Internet blackouts in both Uganda and Iran, a stark contrast to the lack of observed government-directed shutdowns in the same quarter a year prior. This quarter, we also observed a number of Internet disruptions caused by power outages, including three separate collapses of Cuba's national electrical grid.