All The Latest!
Keeping up with cyber-news is hard. Enjoy our specially curated collection of various RSS feeds to help make finding relevant news a little less tedious. If you have something to share, be sure to let us know!
Keeping up with cyber-news is hard. Enjoy our specially curated collection of various RSS feeds to help make finding relevant news a little less tedious. If you have something to share, be sure to let us know!

Agentic workforce is scaling faster than identity and security frameworks can adapt SEATTLE – Feb. 5, 2026 –The latest survey report from the Cloud Security Alliance (CSA), the world’s leading not-for …
This blog post presents the Agentic Trust Framework (ATF), an open governance specification designed specifically for the unique challenges of autonomous AI agents. For security engineers, enterprise …
Identity Governance and Administration (IGA) has long been a pillar of access management. It works well for employees and contractors whose identities are anchored in HR systems, follow predictable li …
As cloud adoption accelerates across industries, the complexity and volume of cloud-specific threats have grown in parallel. Security professionals are increasingly turning to standardized frameworks …
The conversation around artificial intelligence has shifted dramatically over the past two years. We've moved from debating whether AI can write a decent email to grappling with AI systems that c …
Containers are an integral part of a growing number of production environments. But they can become security risks if not managed correctly.
A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
Follow these guidelines to craft a strategy for cloud migration testing, from key tests to common challenges and best practices — and understand why everything involves security.
Certifications can help security pros prove their baseline knowledge of infosec topics. Consider adding these top cloud security certifications to your arsenal.
A click-wrap agreement (click-through agreement) is an online agreement in which the user signifies their acceptance by clicking a button or checking a box that states, 'I agree.'
Hackers associated with the Chinese government used a Trojaned version of Notepad++ to deliver malware to selected users. Notepad++ said that officials with the unnamed provider hosting the update inf …
The US National Reconnaissance Office has declassified information about a fleet of spy satellites operating between 1971 and 2006. I’m actually impressed to see a declassification only two decades af …
Microsoft gives the FBI the ability to decrypt BitLocker in response to court orders: about twenty times per year. It’s possible for users to store those keys on a device they own, but Microsoft also …