Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Transform Your AppSec Program With the Power of Snyk Analytics

As AI-generated code continues to boost developer productivity – and with it the number of vulnerabilities in code – the need for a programmatic approach to security within a fully AI-enabled reality is key. AI Trust and governance is the new standard for the AI era, and is achieved through visibility, prioritization, and policy. With this in mind, over time, Snyk has expanded the number of reports and analytics provided in its platform to address this need.

Finding Software Flaws Early in the Development Process Provides Clear ROI

Organizations spend enormous effort fixing software vulnerabilities that make their way into their public-facing applications. The Consortium for Information and Software Quality estimated that the cost of poor software quality in the United States reached $2.41 trillion in 2022, a number sure to be much higher today. That’s nearly 10% of the current GDP within the US. As we will show, it makes sense that the cost of poor software quality is so high.

CISO Spotlight: Rick Bohm on Building Bridges, Taming AI, and the Future of API Security

Nestled in a log cabin high in the Rocky Mountains, Rick Bohm starts his day the same way he’s approached his career: intentionally, with a quiet commitment to learning and action. Boasting more than three decades of cybersecurity experience, Rick has watched tech evolve from dial-up ISPs to advanced AI-driven security architectures – and through it all, he’s focused on one enduring mission: protecting data, organizations, and people.

Beyond Plain Text: Egnyte's Journey to Structured Data Extraction in RAG Systems

When we first launched Egnyte’s AI features built on retrieval-augmented generation (RAG), customer response was overwhelmingly positive. Users could quickly find and synthesize information from vast document repositories with accuracy and context. But success breeds ambition. As customers grew comfortable with the system, they began exploring new use cases that revealed a limitation: while our RAG excelled with plain text, it struggled with tables, charts, and other structured formats.

Build, test, and scale detections as code with Datadog Cloud SIEM

Security teams often struggle to keep up with rapidly evolving threats, especially when they have to manually manage detection rules. Without automation or version control, it's difficult to maintain consistency across environments, track changes, or deploy updates quickly. Datadog Cloud SIEM supports detection as code, a structured approach to authoring, testing, deploying, and managing detection rules using code and infrastructure-as-code tools like Terraform.

Why AWS-native companies choose Vanta for compliance

Building products while pursuing compliance frameworks like SOC 2 or HIPAA can feel complex and time-consuming. Challenges such as unclear integrations, manual evidence collection, and procurement delays are common, but with AWS-native automation tools, companies can overcome these hurdles and accelerate their compliance journey. ‍ In this post, we'll break down three core ways Vanta simplifies compliance for cloud-forward teams, so you can move faster, stay secure, and focus on building. ‍

Innovations in Splunk Security Expands Unified TDIR Experience to On-Premises and FedRamp Moderate Environments

At RSAC 2025 Conference we announced new innovations to Splunk Security. Today, we are pleased to announce the general availability of Splunk Enterprise Security 8.1. Splunk becomes the only vendor to bring truly unified threat detection, investigation, and response (TDIR) workflows fueled by automation to both customer managed deployments and FedRAMP Moderate environments.

OpenAI Report Describes AI-Assisted Social Engineering Attacks

OpenAI has published a report looking at AI-enabled malicious activity, noting that threat actors are increasingly using AI tools to assist in social engineering attacks and influence operations. In one case, the company banned ChatGPT accounts that were likely being used in North Korean attempts to fraudulently obtain jobs at US companies. “Similar to the threat actors we disrupted and wrote about in February, the latest campaigns attempted to use AI at each step of the employment process.

Keeper Security Named Overall Leader in 2025 GigaOm Radar Report for Enterprise Password Management

GigaOm, a renowned technology analyst firm, has recognized Keeper Security as the Overall Leader in Enterprise Password Management for the fourth year in a row. The GigaOm 2025 Radar Report for Enterprise Password Management highlights Keeper’s Privileged Access Management (PAM) solution, KeeperPAM, which helps organizations secure passwords, credentials, secrets and connections to mitigate cyber risks and defend against internal and external threats.