Chainguard locks down CI/CD with secure-by-default actions
Chainguard has announced Chainguard Actions, secure-by-default workflows for CI/CD pipelines that allow developers and AI agents to ship quickly without introducing software …
Veritone secures AI data with automated PII removal
Veritone deploys Veritone Redact with Veritone Data Refinery (VDR) to remove personally identifiable information (PII) and sensitive data before processing, enabling AI-ready …
Imprivata enhances NHS access security with passwordless controls
Imprivata has introduced new capabilities designed to help NHS organisations and UK healthcare providers meet the unique demands of the UK’s evolving compliance, …
Linux Foundation secures $12.5 million to strengthen open source security and support maintainers
The Linux Foundation has announced a total of $12.5 million in grants from Anthropic, AWS, GitHub, Google, Google DeepMind, Microsoft, and OpenAI to strengthen the security of …
Proofpoint addresses AI threats with intent-based security
Proofpoint has announced Proofpoint AI Security, the newest security solution that combines intent-based detection, multi-surface control points, and a comprehensive …
Jozu Agent Guard targets AI agents that evade controls
Jozu has announced the launch of Jozu Agent Guard, a zero-trust AI runtime that executes agents, models, and MCP servers in secure environments with built-in policy …
Microsoft zeroes in on AI-driven data risks in Fabric
New Microsoft Purview innovations for Microsoft Fabric help organizations secure data and accelerate AI adoption. The updates focus on identifying risks, preventing data …
Millions of UK firms on alert after Companies House data exposure
Companies House, the UK’s official company registry, said its WebFiling service is back online after being shut down on Friday to fix a security issue that may have exposed …
Traefik Triple Gate gains parallel safety pipelines, failover routing, and AI runtime controls
Traefik Labs has announced new capabilities that extend Traefik Hub’s Triple Gate architecture (API Gateway, AI Gateway, and MCP Gateway) with deeper runtime governance across …
Hidden instructions in README files can make AI agents leak data
Developers rely on AI coding agents to set up projects, install dependencies, and run commands by following instructions in repository README files, which provide setup …
What to do in the first 24 hours of a breach
In this Help Net Security video, Arvind Parthasarathi, CEO of CYGNVS, walks through a 10-step process for handling a cybersecurity breach. The first five steps cover …
Cybersecurity jobs available right now: March 17, 2026
Application Security DevSecOps Specialist NTT DATA | Italy | On-site – No longer accepting applications As an Application Security DevSecOps Specialist, you will …
Featured news
Resources
Don't miss
- Why AI changed the threat model for travel technology
- AI red teaming agents change how LLMs get tested
- Verizon DBIR: Vulnerability exploitation is the dominant initial access vector
- TeamPCP breached GitHub’s internal codebase via poisoned VS Code extension
- Microsoft provides mitigation for “YellowKey” BitLocker bypass flaw (CVE-2026-45585)