Category: EN

What exciting new developments are happening in NHIs?

Are Organizations Prepared for the Challenges of Non-Human Identities? Understanding Non-Human Identities in Cybersecurity How do organizations safeguard their machine identities? One emerging focus is the management of Non-Human Identities (NHIs), a paramount aspect of digital protection. NHIs comprise machine…

Why be optimistic about the future of secrets management?

How Does Non-Human Identity Management Revolutionize Secrets Security? Is your organization effectively managing its non-human identities (NHIs)? With the growing complexity of interconnected systems and the surge of machine identities, securing these non-human entities has become a cornerstone in protecting…

How smart can NHIs be in complex enterprise environments?

What Are Non-Human Identities and Why Do They Matter in Complex Enterprise Environments? Where digital transformation accelerates work processes, the concept of Non-Human Identities (NHIs) becomes increasingly important among enterprise environments. But what exactly are NHIs, and why should organizations…

Can Agentic AI operate independently in high-stakes areas?

Can Independent Agentic AI Safeguard Our Critical Systems? Have you ever wondered how we can entrust critical operations to independent systems? The emergence of Agentic AI, with its capacity to operate autonomously, has sparked considerable discussion about its potential role…

Claude expands tool connections using MCP

Anthropic has added interactive tool support to its Claude AI platform, a change powered by the open Model Context Protocol (MCP). The update lets users work directly with external applications inside Claude’s interface rather than relying solely on text interactions…

10 cybersecurity trends to watch in 2026

<p>As cybersecurity leaders begin 2026, they face yet another year of escalations. The attack surfaces they defend are becoming bigger and more complex, while the risks and threats facing their organizations are increasing in volume, velocity and sophistication.</p> <p>It’s a…

CISA Adds Five Known Exploited Vulnerabilities to Catalog

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2018-14634 Linux Kernel Integer Overflow Vulnerability CVE-2025-52691 SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability CVE-2026-21509 Microsoft Office Security…

Here’s the tech powering ICE’s deportation crackdown

From phone spyware and facial recognition to phone unlocking technology and databases and more, this tech powers Trump’s deportation machine. This article has been indexed from Security News | TechCrunch Read the original article: Here’s the tech powering ICE’s deportation…

Best VPN Services of 2026: Fast, Secure & Affordable

In today’s digital world, online privacy and security have never been more important. With cybercrime on the rise and government surveillance becoming more common, protecting your personal information online is crucial. Whether you’re browsing on public Wi-Fi, shopping online, or…

Vulnerability Summary for the Week of January 19, 2026

High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info Patch Info Agatasoft–AgataSoft PingMaster Pro AgataSoft PingMaster Pro 2.1 contains a denial of service vulnerability in the Trace Route feature that allows attackers to crash the application by overflowing…

IAM Identity Center now supports IPv6

Amazon Web Services (AWS) recommends using AWS IAM Identity Center to provide your workforce access to AWS managed applications—such as Amazon Q Developer—and AWS accounts. Today, we announced IAM Identity Center support for IPv6. To learn more about the advantages…