Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Beyond the AI Hype with Netskope: Why Governance is the Bedrock of AI & Cloud Integration at Embecta

Modern enterprise solutions—ranging from cloud data and power platforms to agentic AI and API connections—require rigorous oversight. Every platform integration must be evaluated through the lenses of risk, data compliance, and privacy to ensure secure operations. Netskope provides the necessary visibility and control for all data paths, including APIs and cloud-based AI platforms, helping Embecta enforce the data compliance and privacy standards required when integrating disparate applications.

Episode 15 - The Right Eyes: Mythos, and the Future of Vulnerability Discovery

The emergence of advanced large language models like Anthropic's Mythos represents an epochal shift in cybersecurity, fundamentally altering how zero-day vulnerabilities are surfaced and remediated. In this episode, host Richard Bejtlich sits down with Corelight Co-founder Greg Bell to analyze the security implications of this AI-driven bug explosion, highlighting recent AI-assisted vulnerability discoveries across infrastructure mainstays like FreeBSD and Firefox.

Fireside Chat With TPRA: Three Hard TruthsAbout TPRM in the Post-Mythos Era

Frontier AI models like Mythos have intensified the urgency to rethink cybersecurity. But for third-party risk teams, the harder question remains: how do we prioritize the actions that actually drive business outcomes? As TPRM becomes more tightly tied to business impact, resilience, continuity, and revenue protection, leaders need a clearer view of the hard truths shaping their programs.

New Security Gap: Your WAF Has No Idea What Your AI Is Doing

In this webcast, we get into why signature-based protection breaks down in AI-first environments, what behavioral detection and positive security models actually look like in production, and what it takes to evaluate whether your runtime tools are genuinely adapting to your environment or just adding noise to your stack.

How to Extend SPIFFE Beyond Kubernetes: Bring Zero Trust Identity to Your VMs

Our previous post, How to Secure Microservices with SPIFFE and Istio, showed how to secure Kubernetes microservices using Istio policy and SPIFFE identities, with Teleport issuing the identities that the mesh trusts. The question teams face next is: How do you extend that identity-driven security model to workloads outside Kubernetes — such as VMs, edge gateways, and legacy services — without creating a massive certificate-management project?

Securing The AI Revolution: How Snyk And Our Partners Are Scaling For The Future

Snyk started as a classic product-led growth company. For our first two years, we didn't need a sales team — the product sold itself to developers. That's a rare thing, and we're proud of it. It meant we had genuine product-market fit before we had a go-to-market motion. But markets evolve, and so did we. Today, AI coding agents are generating code at a velocity that significantly outpaces the ability of security teams to review it.

Snyk announces Anthropic updates: Evo integrates with Claude Enterprise, and Snyk Desk comes to Claude Desktop

Today, we're announcing two new integrations with Anthropic that cover both sides of AI-assisted development. Evo by Snyk now integrates with Anthropic's Claude Enterprise, giving security and compliance teams a complete inventory of their Claude environment models, approved MCP servers, per model risk signals, and tool-level permissions in the platform they already use to govern the rest of the stack.