Insights

How to prepare for NERC CIP compliance deadlines in 2026 and beyond

Explore key cybersecurity requirements and implementation deadlines for electric power utilities included in the NERC CIP-003-9 standard for Low-Impact BES (Bulk Electric System) Cyber...

FIM Test: A Method for Distinguishing True FIM Capabilities in a Crowd of Claims

In a previous blog, we presented NIST’s benchmark definition of integrity monitoring. The conclusion was clear: Many vendor claims of file integrity monitoring (FIM)...

Introducing AI-powered Contextual Project Classification: From severity scores to business risk

Today, Mend.io is launching Contextual Project Classification, an AI-native feature that automatically analyzes your codebase to identify which applications handle sensitive data like payments,...

Orchid Security Recognized by Gartner® as a Representative Vendor of Guardian Agents

New York, United States, March 17th, 2026, CyberNewswire Unleash AI adoption securely: discover, attribute, and govern AI agents throughout the enterprise Orchid Security, the...

The State of Secrets Sprawl 2026: AI-Service Leaks Surge 81% and 29M Secrets Hit Public GitHub

In less than a year, AI-assisted coding went from novelty to habit. What used to be a specialized workflow for experienced engineers is now...

Agentic AI in the SOC: The Governance Layer you Need Before You Let Automation Execute 

The risk isn’t AI getting an answer wrong. The risk is AI taking action. Most SOC leaders I talk to are hearing the same message from the business — use AI to...

Trending News

Face value: What it takes to fool facial recognition

ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026...

Cyber fallout from the Iran war: What to have on your radar

The war in Iran was less than 24 hours old when it produced a historic first: the deliberate targeting of commercial data centers. On March...

Sednit reloaded: Back in the trenches

Since April 2024, Sednit’s advanced development team has reemerged with a modern toolkit centered on two paired implants, BeardShell and Covenant, each using a different...

What cybersecurity actually does for your business

Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...

How SMBs use threat research and MDR to build a defensive edge

Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...

Protecting education: How MDR can tip the balance in favor of schools

Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response...