CEO of LayerX Security, a company specializing in user-first browser protection. A former officer in the IDF’s intelligence and information warfare units, Eshed has extensive experience in offensive ...
Belgium's NIS2 conformity assessment deadline hits April 18, 2026, and other EU member states are ramping enforcement close ...
NIST, overrun by a 263% surge in CVE submissions over five years, is limiting the amount of analysis and enriching of critical security flaws it does. Now the private sector, which relied on the ...
Under a new model announced by the National Institute of Standards and Technology, NVD will no longer enrich every CVE.
Over the past 6-8 months, researchers at my company discovered vulnerabilities across multiple AI tools that allowed external bad actors to steal data, ...
IBM is offering new autonomous services to help organizations protect themselves from the rapidly growing security threats posed by advanced and highly capable AI frontier models like Anthropic's ...
Cyber policy has always lagged cyber reality. Regulations arrive after breaches, frameworks emerge after failures, and accountability structures ...
Escape is the best XBOW alternative for continuous AI pentesting across APIs, web apps, and complex authentication — with ...
There is a certain irony in watching a statute designed to prevent clandestine eavesdropping on telephone calls become one of the most aggressively ...
Last week, Anthropic pulled back the curtain on Claude Mythos Preview, an AI model so capable at finding and exploiting software vulnerabilities that the company decided it was too dangerous to ...
The timing is off, and it seems to be getting worse. Traditional application security pipelines were designed way back in the days when only humans wrote ...
Compare the best AI governance tools for enterprises in 2026. Learn what most platforms miss and how to actually control AI risk.