Samsung’s Galaxy S26 turns privacy into a visible and invisible feature

The Samsung Galaxy S26 series is out, offering plenty of security features that protect personal data while providing users with transparency and control over how their information is used.... Read more »

Anthropic acquires Vercept to expand the capabilities of AI computer use

Anthropic has acquired Vercept to help push Claude’s computer use capabilities further. People are using Claude for increasingly complex work, including writing and running code across entire repositories, synthesizing... Read more »

Wireshark 4.6.4 resolves dissector flaws, plugin compatibility issue

Packet inspection remains a routine activity across enterprise networks, incident response workflows, and malware investigations. Continuous use places long-term stability and parsing accuracy at the center of daily operations.... Read more »

Intellicheck Desktop Application helps organizations combat identity theft

Intellicheck announced the roll out of its enriched Desktop Application. The new Desktop Application allows any sized organization to immediately stop identity theft and fraud losses. Implementation is immediate.... Read more »

Lightrun brings live runtime context to AI site reliability engineering

Lightrun has announced real-time AI SRE built on live, in-line runtime context. This enables AI agents and engineering teams to dynamically generate missing evidence without redeployments, prove root causes... Read more »

Veza strengthens identity security for AI agents

Veza announced an expansion of the Veza Platform with the introduction of Veza Access Agents, a set of purpose-built AI Agents designed to automate complex identity and access governance... Read more »

The $19.5 million insider risk problem

Routine employee activity across corporate systems carries an average annual cost of $19.5 million per organization. That figure comes from the 2026 Cost of Insider Risks Global Report, conducted... Read more »

APCON IntellaStore IV analyzes network traffic characteristics for further processing

Deploying the IntellaStore IV Network Security Appliance from APCON means easy installation, dedicated network packet capture, and a seamless workflow from traffic of interest to security and compliance tools.... Read more »

Open-source security debt grows across commercial software

Open source code sits inside nearly every commercial application, and development teams continue to add new dependencies. Black Duck’s 2026 Open Source Security and Risk Analysis Report data shows... Read more »

Review: Digital Forensics, Investigation, and Response, 5th Edition

Digital Forensics, Investigation, and Response, 5th Edition presents a structured survey of the digital forensics discipline. The book spans foundational principles, platform specific analysis, specialized branches, and incident response... Read more »
Subscribe to our Newsletter