Insights
Google’s $32B Wiz Bet: Why Security Consolidation Means You’re Losing Negotiating Power
In July 2024, Google approached Wiz with a $23 billion acquisition offer. Wiz declined. By 2026, reports suggest Google is back with an offer...
Enterprise AI Agent Governance: A Layered Approach (Build, Deployment and Runtime)
Emerging Governance Challenges As organizations implement AI agents on a large scale, they are likely to encounter governance challenges. The current focus in AI...
Threat Detection with MITRE ATT&CK and D3FEND AI Agent
Mar 18, 2026 Threat Detection with MITRE ATT&CK and D3FEND AI Agent This blog post is the first in a series on Swimlane’s fleet...
Is All OAuth The Same For MCP?
There’s a funny saying making the rounds right now: “The S in MCP stands for security.” Of course, there is no S in MCP and that’s kind of...
Rethinking Cyber Awareness: From Blame to Belonging
Every year, as Cybersecurity Awareness Month arrives, organizations dust off their campaigns, roll out phishing tests, and remind employees to think before they click....
AI Governance Starts With Access, Not Models | SaaS + AI
By Idan Fast, CTO, Grip Security We recently released our 2026 SaaS + AI Data Report, From Chaos to Control, and as I...
Trending News
Face value: What it takes to fool facial recognition
ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026...
Cyber fallout from the Iran war: What to have on your radar
The war in Iran was less than 24 hours old when it produced a historic first: the deliberate targeting of commercial data centers. On March...
Sednit reloaded: Back in the trenches
Since April 2024, Sednit’s advanced development team has reemerged with a modern toolkit centered on two paired implants, BeardShell and Covenant, each using a different...
What cybersecurity actually does for your business
Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...
How SMBs use threat research and MDR to build a defensive edge
Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...
Protecting education: How MDR can tip the balance in favor of schools
Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response...
