Artificial Intelligence Enterprise Security4 Min Read December 1, 2025 Webinar: The "Agentic" Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams The AI browser wars are coming to a desktop near you, and you need to start worrying about their security challenges. For the last two…
Enterprise Security Threat Detection3 Min Read November 28, 2025 Why Organizations Are Turning to RPAM As IT environments become increasingly distributed and organizations adopt hybrid and remote work at scale, traditional perimeter-based…
Email Security Enterprise Security3 Min Read November 28, 2025 MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass Microsoft Defender for Office 365…
AI Security Enterprise Security5 Min Read November 26, 2025 When Your $2M Security Detection Fails: Can your SOC Save You? Enterprises today are expected to have at least 6-8 detection tools, as detection is considered a standard investment and the first line of…
Enterprise Security Zero Trust8 Min Read November 18, 2025 Beyond IAM Silos: Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities Identity security fabric (ISF) is a unified architectural framework that brings together disparate identity capabilities. Through ISF,…
Browser Security Enterprise Security4 Min Read November 10, 2025 New Browser Security Report Reveals Emerging Threats for Enterprises According to the new Browser Security Report 2025, security leaders are discovering that most identity, SaaS, and AI-related risks converge in…
Data Breach Enterprise Security4 Min Read October 22, 2025 Why You Should Swap Passwords for Passphrases The advice didn't change for decades: use complex passwords with uppercase, lowercase, numbers, and symbols. The idea is to make passwords…
Agentic AI Enterprise Security2 Min Read October 4, 2025 CometJacking: One Click Can Turn Perplexity’s Comet AI Browser Into a Data Thief Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity's agentic AI browser Comet by…
DevOps Enterprise Security5 Min Read October 3, 2025 Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise Security Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address the increasing…
Artificial Intelligence Enterprise Security5 Min Read September 29, 2025 The State of AI in the SOC 2025 – Insights from Recent Study Security leaders are embracing AI for triage, detection engineering, and threat hunting as alert volumes and burnout hit breaking points. A…
Enterprise Security Security Validation4 Min Read September 26, 2025 Crash Tests for Security: Why BAS Is Proof of Defense, Not Assumptions Car makers don't trust blueprints. They smash prototypes into walls. Again and again. In controlled conditions. Because design specs don't…
AI Security Enterprise Security3 Min Read September 16, 2025 Securing the Agentic Era: Introducing Astrix's AI Agent Control Plane AI agents are rapidly becoming a core part of the enterprise, being embedded across enterprise workflows, operating with autonomy, and making…
Enterprise Security4 Min Read September 10, 2025 Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises Phishing-as-a-Service (PhaaS) platforms keep evolving, giving attackers faster and cheaper ways to break into corporate accounts. Now,…
Enterprise Security Vulnerability2 Min Read September 5, 2025 SAP S/4HANA Critical Vulnerability CVE-2025-42957 Exploited in the Wild A critical security vulnerability impacting SAP S/4HANA, an Enterprise Resource Planning (ERP) software, has come under active exploitation in…
Artificial Intelligence Enterprise Security4 Min Read August 29, 2025 Can Your Security Stack See ChatGPT? Why Network Visibility Matters Generative AI platforms like ChatGPT, Gemini, Copilot, and Claude are increasingly common in organizations. While these solutions improve…
Enterprise Security Vulnerability2 Min Read August 29, 2025 Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page Click Studios, the developer of enterprise-focused password management solution Passwordstate, said it has released security updates to…
Data Protection Enterprise Security3 Min Read August 28, 2025 The 5 Golden Rules of Safe AI Adoption Employees are experimenting with AI at record speed. They are drafting emails, analyzing data, and transforming the workplace. The problem is…
Artificial Intelligence Enterprise Security3 Min Read August 27, 2025 MixShell Malware Delivered via Contact Forms Targets U.S. Supply Chain Manufacturers Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that’s targeting supply chain-critical…
Enterprise Security Malware2 Min Read August 25, 2025 Noodlophile Malware Campaign Expands Global Reach with Copyright Phishing Lures The threat actors behind the Noodlophile malware are leveraging spear-phishing emails and updated delivery mechanisms to deploy the…