top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


Dataminr’s $290M ThreatConnect Acquisition Signals a New Era of “Agentic AI” in Cyber Threat Intelligence
In a significant move for the cybersecurity intelligence market, New York–based AI-analytics firm Dataminr announced today its intent to acquire Arlington-Virginia’s intelligence-platform vendor ThreatConnect in a deal valuing the latter at approximately $290 million. The deal signals a strategic push by Dataminr into deeper, context-driven threat intelligence capabilities — combining its strength in public-data event detection with ThreatConnect’s specialty in internal-dat
Oct 21, 2025


Varonis Exposes Azure App Loophole That Let Attackers Masquerade as Microsoft Services
Security researchers at Varonis have uncovered a subtle yet powerful flaw in Microsoft Azure’s application registration system that allowed malicious actors to create fake apps with names like “Azure Portal,” bypassing long-standing safeguards meant to prevent impersonation of official Microsoft tools. The loophole—since patched by Microsoft—stemmed from the use of hidden Unicode characters to disguise application names. By inserting invisible “Combining Grapheme Joiner” cha
Oct 21, 2025


Cycode steps into the AI-governance ring to squash “Shadow AI”
In a move highlighting the growing urgency around AI governance, crypto-secure application‐risk specialist Cycode today unveiled two new capabilities designed to tame what it calls “Shadow AI” — the unauthorized, unsupervised use of AI assets inside software development lifecycles. The first: an AI & ML Inventory , which automatically scans an organization’s code repositories, pipelines and infrastructure, identifying all AI coding assistants, model servers, Model Context Pr
Oct 21, 2025


A Perfect Storm for Enterprise Risk: Cyber-Attacks, AI Blind Spots and Trade Friction Converge
In an era when geopolitics, regulation and innovation are colliding at high velocity, enterprises are sounding the alarm on a new breed of risk—one in which trade policy, state-sponsored cyber threats and under-governed artificial intelligence are converging to create a complex danger zone. According to the Riskonnect 2025 New Generation of Risk Report , a global survey of over 200 risk, compliance and resilience professionals reveals that traditional risk playbooks may be f
Oct 21, 2025


How to Prevent Attackers from Stealing Data in Plain Sight
This guest blog was contributed by Dr. Süleyman Özarslan , co-founder of Picus Security and VP of Picus Labs Data exfiltration remains the easiest part of the attack chain, with organizations blocking 3% of attempts . That weakness gives attackers an almost unfettered path to stealing sensitive data. Ransomware groups no longer need to rely on file encryption. Their ability to quietly steal data and threaten its exposure powers most ransomware operations. They understand th
Oct 21, 2025


Cyware and Microsoft Join Forces to Supercharge Threat Intelligence Automation
In a move that signals the next phase of convergence between security operations and artificial intelligence, Cyware has announced a strategic partnership with Microsoft to deliver a fully integrated, AI-driven threat intelligence ecosystem. The collaboration fuses Cyware’s automation and orchestration capabilities with Microsoft Sentinel’s security analytics platform, creating a seamless workflow from threat detection to response. For years, organizations have struggled to
Oct 21, 2025
bottom of page