Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Is Moving Fast in Manufacturing

Artificial intelligence is rapidly becoming embedded across manufacturing environments, from engineering and design to supply chain optimisation and operations. What was once experimental is now being applied in day-to-day workflows, often driven by the need for speed, efficiency, and competitive advantage. Recent research shows that 73% of manufacturing organisations report rapid AI adoption, with 90% ranking AI as a top security priority for 2026. The direction of travel is clear.

Best Tools for Data Discovery and Classification in 2026

Data discovery has fundamentally changed over the last two years. The question is no longer just "Where is our sensitive data?" Organizations that stop there have a map but no enforcement. The tools that actually reduce risk answer a harder set of questions: Where did the data come from? Where is it going? Who touched it? And can we stop it before it causes damage?

The Fastest-Growing AI Categories in the Enterprise Are Also the Riskiest

Security teams often focus governance efforts on the most popular AI tools. But the real risk question isn't which tools employees use most. It's which tools are growing fastest and what data those tools can reach. New data from Cyberhaven Labs shows that the AI categories posting the largest year-over-year growth numbers are the same categories with privileged access to source code, credentials, customer contracts, and internal architecture.

Why Innovation at Bitsight Is a Culture, Not Just a Scorecard

I’ve spent a lot of time recently thinking about what "innovation" actually means in an industry that moves as fast as cybersecurity. It’s a term that gets thrown around a lot, but as a product leader at Bitsight, I see it as something much deeper than just shipping new features. It's about a fundamental shift in how we help organizations stay resilient.

Zero-Day Attacks and How to Protect Your Systems from Them

Zero-day attacks are one of the most serious threats in cybersecurity. They target unknown software weaknesses and can cause damage before anyone is aware of the issue. It is important to understand how these attacks work to better protect systems and data. A Zero-day attack exploits a software vulnerability that is unknown to the developer but already known to attackers. The attacker tries to exploit the vulnerability before the concerned team can identify and apply a patch to fix it.

What Insider Threat Monitoring Reveals About Hidden Organizational Risk

Security teams that deploy insider threat monitoring for the first time rarely catch what they went looking for. They wanted a bad actor. What they found was a ground-truth map of how their organization actually handles sensitive data, and in most cases, that map looked nothing like the policies on paper. That gap, between documented security controls and real-world data behavior, is precisely what insider threat monitoring exposes.

Cutting Through Security Noise with Managed Detection and Response

Security incidents rarely announce themselves all at once. And they almost never hinge on a single missed alert. But they do succeed because weak signals accumulate quietly across time, tools, and environments until no one can confidently reconstruct the full story. Security teams are already familiar with this dynamic as telemetry arrives continuously from endpoints, identities, networks, and cloud platforms.

Incident Response: Keeping Cool When Everything's on Fire

The DevOps revolution broke down the traditional silos between development and operations, fundamentally reshaping how we build and maintain software. But with this evolution came an inevitable, and often stressful, reality for many engineers: being on-call and responding to incidents. In this session, Daljeet Sandu will explore how on-call has evolved in recent years, highlight proven best practices, and share insights into the future of incident response in DevOps.

Reviewing Malicious PRs at Scale with AI

As AI coding assistants accelerate software development, the volume of pull requests at Datadog has grown to nearly 10,000 per week, increasing the risk that malicious changes slip through due to review fatigue. To address this, Datadog built BewAIre, an LLM-powered code review system designed to identify malicious source code changes introduced by threat actors. By reducing approval fatigue for developers while increasing friction for attackers, BewAIre guides human reviewers to the areas where judgment matters most, without slowing developer velocity.