Security Technology & Operations

CyberArk Positions Machine Identity Security as its 2026 Growth Engine

CyberArk is anchoring its 2026 growth strategy on machine identity security, elevating PKI, CLM, and AI agent governance while positioning identity as the foundational...

Privacy Regulation Roundup

This Privacy Regulation Roundup summarizes the latest major global privacy regulatory developments, announcements, and changes. This report is updated on a monthly basis.

Device-First Continuum AI: The Technology Behind mimik's Approach

mimik is the first company we've encountered that discusses how to operationalize billions of agents to perform tasks in the physical world, not only within software...

Threat Landscape Briefing – January 2026

This monthly recording covers topics such as cyber threat trends, nation states, cyber criminals, hacktivists campaigns, data breaches, control strategies, and exposure to...

LastPass Update: Roadmap and Recent Developments, 2H 2025

LastPass has been busy adding new features and enhancing current ones. Demand is growing developing for tools that address both traditional credential management and...

Improve CIAM

Modern CIAM is broken by the Security vs. UX paradox. We need to replace fragmented identity silos with adaptive orchestration that secures the user journey and ensures...

Implement Agentic Security Operations

Legacy SOCs are drowning in alerts and machine-speed threats. Static automation isn't enough; we need to match AI-powered attacks with AI-powered defense. By deploying...

Threat Landscape Briefing – December 2025

This monthly recording covers topics such as cyberthreat trends, nation states, cybercriminals, and hacktivists campaigns, data breaches, control strategies, and exposure...

Develop a Strategic Plan for Intelligent Application Security Phases 1-3

A step-by-step framework to take an intelligent approach to building a scalable and adaptive application security.

iSSDLC Capabilities Assessment Tool

An Excel-based tool to develop your improvement plan across an intelligent Secure Software Development Lifecycle (iSSDLC).
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us