Application Security Post-Quantum Cryptography: What C-Level Leaders Must Do Now—Before It Becomes a Crisis Quantum computing is no longer a distant threat - it is a board-level risk with a defined timeline. Governments across North America, Europe, and the UK are already directing organizations to begin transitioning to post-quantum cryptography (PQC), with full migration expected over the next decade. Prakash Sinha |May 01, 2026
Agentic AI Security Anthropic Claude Mythos and the End of Patch Centric Security When Anthropic unveiled Claude Mythos, the cybersecurity industry fixated on the headline: thousands of zero day vulnerabilities discovered autonomously, across nearly every major OS, browser, and software stack. Dror Zelber |April 30, 2026
Agentic AI Security From Newborn Models to Autonomous Agents: Why "House Rules" Aren't Enough Think of an AI model like a newborn child. At the beginning, it lives in a controlled environment, guided entirely by its parents, learning what is allowed and what is not. These early instructions, the “house rules” shape its understanding of the world. Rotem Elharar |April 29, 2026
Agentic AI Security Anthropic Claude Mythos and the 2026 Cybersecurity Landscape The emergence of Anthropic’s Claude Mythos model could mark a pivotal shift in the cybersecurity landscape, characterized by the transition from human-led research to machine-scale operations. Pascal Geenens |April 28, 2026
DDoS Protection Application Layer DDoS in an Era Where Everything Looks Legitimate At 07:42 on a weekday morning, nothing looked wrong. Requests flowed normally. Services responded as expected. Monitoring dashboards showed green. Thirty minutes later, a public financial service supporting several million beneficiaries across EMEA was under extreme pressure from nearly 10 million encrypted requests every second. Eva Abergel |April 24, 2026
Agentic AI Security Unlocking a New Service Opportunity for SIs and MSSPs with Agentic AI Protection As enterprises rapidly adopt agentic AI technologies—ranging from desktop copilots to custom-built autonomous agents—the security conversation is fundamentally changing. Gilad Friedman |April 23, 2026
Application Security AI Crawler Traffic Is Exploding: What Website Owners Must Do Now Right now, OpenAI, Apple, Meta, Anthropic, Amazon, and Perplexity are crawling your website. Not occasionally. Continuously. Anirudh K |April 22, 2026
Threat Intelligence A CTI Perspective on "Agents of Chaos" Research A fascinating new paper titled "Agents of Chaos" has recently been published, representing a massive red-teaming collaboration among 38 researchers from top institutions (Harvard, MIT, Technion, etc.). Arik Atar |April 21, 2026
Service Providers The MSSP Evolution: From Connectivity Provider to Security Service Enabler Managed Security Service Providers (MSSPs) are facing a significant shift. As connectivity becomes increasingly commoditized and bandwidth costs continue to fall, traditional revenue streams are under pressure. Lena Frid |April 16, 2026
Agentic AI Security Why Agent & Tool Visibility Is Imperative for AI Security Posture Management As organizations accelerate their adoption of autonomous, agent‑driven AI, one truth is becoming undeniable: you cannot secure what you cannot see. Agentic AI systems already move far beyond the predictable, linear workflows of traditional software. Dror Zelber |April 15, 2026
Application Delivery When AI-Era Threats Outgrow Local Compute – Application Delivery Perspective In today’s hyper-connected world, where cybersecurity landscape and multi-cloud architectures evolve at breakneck speed, organizations must continuously modernize infrastructure to stay ahead of emerging threats and performance demands. Avi Katz |April 14, 2026
Agentic AI Security The Rise of Shadow Agents: How Employees Are Deploying AI Tools Outside Security’s Control Shadow IT was about unsanctioned apps and spreadsheets. Shadow agents are far more consequential. Dror Zelber |April 09, 2026