Topic: security governance
-
Top Cybersecurity Jobs Hiring Now: January 27, 2026
The global cybersecurity field offers diverse, high-demand career paths ranging from strategic leadership roles like Chief Information Security Officer (CISO) to hands-on technical positions in areas such as penetration testing and incident response. Key responsibilities across these roles includ...
Read More » -
Secure Code Warrior Debuts AI Traceability to Boost Developer Security
Secure Code Warrior has launched a beta program for Trust Agent: AI, a new module that provides CISOs with traceability and governance over AI coding tools used by developers. The platform addresses the challenge of unmonitored AI tool usage by offering real-time insights into AI-generated code, ...
Read More » -
Agentic AI: A CISO's Identity Crisis and Accountability
Agentic AI introduces a new, complex identity class that shatters traditional security assumptions, combining autonomous, decentralized operation with human-like intent and machine-scale persistence. These AI agents create severe security risks by multiplying existing identity vulnerabilities, su...
Read More » -
Boost SaaS Security with NIST CSF & Agentic AI
The rapid adoption of SaaS and AI often outpaces security, creating risks; the NIST Cybersecurity Framework provides a structured blueprint to balance innovation with robust protection. Effective security requires strong governance and collaboration between InfoSec and SaaS teams, alongside criti...
Read More » -
Securing AI Agents in SaaS with Obsidian
Obsidian Security has launched a new defense system specifically designed to secure AI agents in SaaS environments, addressing the security gaps and cascading threats created by their rapid integration and excessive permissions. The proliferation of AI agents, such as those from Microsoft Copilot...
Read More » -
Insider Threats: Australia's Top Cybersecurity Risk
Australian organisations are shifting their cybersecurity focus to insider threats, with 84% expecting an increase and 58% ranking them as a greater risk than external attackers. Many businesses are unprepared for insider threats, as only 34% use advanced detection tools like user behaviour analy...
Read More » -
FinWise Breach: Why Encryption Is Your Final Defense
The 2024 FinWise data breach was caused by a former employee who exploited retained login credentials, accessing sensitive data for 689,000 customers undetected for over a year. The breach exposed inadequate security measures, including possible encryption failures and lack of monitoring for irre...
Read More » -
GitLab 18.4 Release: New Features & Updates
GitLab 18.4 expands its AI toolset with features like a catalog for custom agents, enhanced code navigation, and greater control over AI models to improve developer workflow. The update introduces the GitLab Duo AI Catalog for sharing agents and the Knowledge Graph for codebase mapping, alongside...
Read More » -
Top Cybersecurity Jobs Hiring in September 2025
The cybersecurity field is experiencing high demand for professionals in September 2025, with global opportunities available in various roles and work arrangements, including remote positions. Key roles being recruited for include Application Security Engineers, CISOs, Cloud Security Architects, ...
Read More » -
Top Cybersecurity Jobs Hiring Now: January 2026
The global cybersecurity job market is experiencing high demand for specialized roles, with key positions including Chief Information Security Officers (CISOs), Cyber Defence Specialists, and various types of Security Engineers and Analysts across countries like Australia, France, and the UAE. Sp...
Read More » -
Hiring Now: Top Cybersecurity Jobs for September 2025
The cybersecurity job market is expanding rapidly due to increasing cyber threats, with high demand for specialized roles across various sectors and countries. Key positions include Chief Information Security Officers (CISOs) who develop security strategies and manage risk, and other roles like C...
Read More » -
Oktane 2025: Securing Every Identity, AI, and App
The rise of autonomous AI agents in workflows creates unprecedented security challenges, demanding a unified identity security fabric for protection across all users and applications. Legacy authorization models like OAuth are inadequate for AI agents, leading to security blind spots and user cog...
Read More » -
Google Gemini Enterprise: AI for Business Productivity
Google has launched Gemini Enterprise, a new AI platform designed to boost workplace productivity and compete with rivals like Microsoft and OpenAI by integrating with existing company data and applications. The platform features multimodal AI capabilities, pre-built agents for common tasks, and ...
Read More » -
Secure Your Shipyard: Modern OT Security for Major Projects
The fluid, project-based nature of shipbuilding, with its rotating contractors and temporary systems, creates a constantly shifting threat surface that defies traditional static perimeter security models. Securing legacy operational technology (OT) that cannot be patched requires a focus on passi...
Read More » -
AI Agents on Your Team: The Unseen Security Risks
AI agents are evolving into autonomous systems that perform complex tasks like incident resolution and system management, introducing significant security challenges alongside efficiency gains. These autonomous agents differ from traditional tools by reasoning, adapting strategies, and accessing ...
Read More »