Why Integrated Threat Defense and Autonomous Remediation Are the Only Strategy for the AI Era

In many boardrooms today, there is a comfortable sense of security derived from a list of completed line items. You have checked the boxes for intrusion prevention system (IPS), sandboxing, URL Filtering and DNS Security. In a previous era of cybersecurity, this was the gold standard.

Apr 20, 2026
Continuing the Mission: Securing Black Hat Asia 2026

Continuing the Mission: Securing Black Hat Asia 2026

Black Hat Asia stands as the premier cybersecurity event in the APAC region, where elite researchers unveil zero-day exploits, trainers demonstrate cutting-edge attack techniques, and thousands of security professionals gather at Marina Bay...
Apr 15, 2026
Data Knows No Boundaries, Neither Should Your Security

Data Knows No Boundaries, Neither Should Your Security

Here is a question I ask every CISO I meet: Do you know the real-time location of your sensitive data? I'm not asking theoretically or based on last quarter's audit, I mean right n...
Apr 09, 2026
When Security Scanners Become the Weapon: Breaking Down the Trivy Supply Chain Attack

When Security Scanners Become the Weapon: Breaking Down the Trivy Supply Ch...

The Trivy Supply Chain Attack shows how security tools can be weaponized. Learn how this 2026 breach unfolded and how Cortex Cloud blocks the threat.
Mar 24, 2026
Turning Device Context into Action: The Power of Contextual Segmentation

Turning Device Context into Action: The Power of Contextual Segmentation

Traditional network segmentation was designed for a time when networks were static, devices were predictable, and security policies rarely changed. To...
Apr 20, 2026

Subscribe to the Newsletter!

Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more.