data
Strategic Cybersecurity Architecture for India’s Defence Industry: From Compliance to Autonomous Resilience
Introduction India’s Defence Industrial Base is entering a defining phase. The shift toward “Indigenization 2.0” is accelerating the development of sovereign platforms, indigenous operating systems, and AI-enabled warfighting capabilities. At the same ...
Strategic Cybersecurity Architecture for India’s Defence Industry: From Compliance to Autonomous Resilience
Introduction India’s Defence Industrial Base is entering a defining phase. The shift toward “Indigenization 2.0” is accelerating the development of sovereign platforms, indigenous operating systems, and AI-enabled warfighting capabilities. At the same ...
Nudge Security Extends Ability to Secure Data in the AI Era
Nudge Security today extended the scope of its namesake security and governance platform to monitor sensitive data shared via uploads and integrations with an artificial intelligence (AI) service, in addition to now ...
Security’s Next Control Plane: The Rise of Pipeline-First Architecture
For years, security operations have relied on monolithic architectures built around centralized collectors, rigid forwarding chains, and a single “system of record” where all data must land before action can be taken ...
Operationalizing Threat Intelligence and AI-Powered Cyber Defense
Sachin Jade, chief product officer at Cyware, discusses the evolving challenge of operationalizing threat intelligence and how AI is redefining the speed and scale of cyber defense. Jade explains that most organizations ...
Another Day, Another Data Dump: Billions of Passwords Go Public
In the past few years, the security industry has seen several reports on massive password leaks. The number of exposed credentials in these leaks is staggering: 10 billion, 26 billion, and sometimes ...
Why Attackers Still Hoard Encrypted Data (and Why That Should Worry You)
Ron Zayas, CEO of Ironwall by Incogni, tackles a sobering question: why do attackers keep harvesting encrypted data—and why are organizations so complacent about it? Zayas notes that it’s not just “foreign” ...
Your Digital Shadow: Why Human-Powered Due Diligence Still Matters in the Age of Data Overload
There’s never been more data available about people and organizations. Yet, paradoxically, the overwhelming volume of that data can obscure the very truths security professionals are trying to uncover. In a landscape ...
Survey: AI Agents Are Now Biggest Threat to Cybersecurity
A survey of 200 North American security leaders found 63% see employees unintentionally giving AI agents access to sensitive data as the top internal threat ...
Emerging Agentic AI Security Vulnerabilities Expose Enterprise Systems to Widespread Identity-based Attacks
Security researchers have identified several critical ways attackers can exploit agentic AI systems to expose sensitive data and conduct malicious activity ...

