top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Ridge Security Unveils Agentic AI Penetration Testing Platform to Bring Continuous Security Validation to SMBs
At RSAC 2026, Ridge Security introduced a new iteration of its PurpleRidge Security platform, positioning it as a shift in how smaller organizations approach penetration testing and continuous threat exposure management. The Silicon Valley company, known for its AI-driven offensive security tools, is now leaning into agentic AI to automate what has traditionally been a labor-intensive and costly process. PurpleRidge is designed as a fully self-service penetration testing pla
Mar 23


Bindplane Unveils Autonomous Security Pipeline Management and Threat Intelligence Enrichment at RSAC 2026
At the RSAC 2026 Conference, Bindplane introduced a new approach to managing one of the most complex layers of modern cybersecurity operations: the telemetry pipeline. As organizations expand across multi-cloud environments and ingest massive volumes of security data, the challenge is no longer just collecting telemetry, but managing, optimizing, and extracting meaningful insights from it in real time. Bindplane’s latest release, Global Intelligence, signals a shift toward a
Mar 22


Residential Proxies Have Become One of Security’s Largest Blind Spots
This guest article was contributed by Alastair Parr, CTO of Spur A growing share of the traffic security teams evaluate each day comes from residential proxies that pool IP addresses from consumer ISPs and mobile devices. Most people don’t realize they’ve opted into a residential proxy, and most organizations lack the context to fully understand how often this traffic reaches them. Residential proxies make it difficult to distinguish legitimate traffic from malicious activity
Mar 14


When Your Legitimate Calls Don’t Get Through: The Silent Risk Facing Every Enterprise
Voice is still central to business outcomes -- from banks confirming fraud alerts, to hospitals coordinating care, to retailers following up on customer inquiries. But legitimate calls that originate outside the U.S. and use U.S.-based numbers are increasingly and inadvertently mislabeled as spam or blocked outright due to FCC rules and fragmented verification frameworks. The result: missed connections, wasted resources and new openings for fraud. In this Q&A with Peter Ford,
Jan 21


Cybersecurity Predictions for 2026: When Bots, Agents, and Humans Collide
For most of the past decade, cybersecurity predictions have followed a familiar script. More ransomware. More phishing. More AI on both sides of the fight. But as 2026 approaches, a quieter shift is underway, one that forces organizations to rethink not just threats, but who and what is actually showing up on their digital front doors. The next wave of disruption is not only about attackers getting smarter. It is about the internet filling up with nonhuman actors that behave
Dec 15, 2025


SAFE’s Balbix Acquisition Signals the First Real Shot at Autonomous Cyber Risk Management
The cybersecurity world loves to hype “platform unification,” but rarely does anything land with the weight of a true architectural shift. Today is one of those rarities. SAFE — the company synonymous with autonomous cyber risk quantification — has acquired Balbix, the long-established leader in Continuous Threat Exposure Management (CTEM). Together, they’re attempting to fuse two domains that have been historically siloed: operational exposure data and business-level risk i
Nov 18, 2025
bottom of page