theme-sticky-logo-alt
Please assign a Header Menu.
Security and Risk Management
Why Continuous Identity Verification Matters
By Thi Nguyen-Huu, Founder and CEO of WinMagic 1.    Why has the cybersecurity industry remained fixated on login events instead of rethinking identity as a continuous process?   Because login was easy to model, and continuous identity was hard to build. A login event has a clean shape—a credential is presented, a server evaluates it,... Read More
Qrypt CTO Highlights Quantum‑Safe AI Networking
AI workloads are exploding in size and speed, pushing enterprise networks to their limits. According to IDC, AI‑related data traffic will grow 40 % year‑over‑year through 2027, stretching existing encryption schemes that were designed for slower, less complex traffic patterns. As the quantum computing horizon draws nearer, the cryptographic foundations of today’s AI pipelines risk becoming... Read More
Straiker AI Security Platform Makes AI 100
Straiker’s inclusion in CB Insights’ 2026 AI 100 list spotlights its AI security platform, a real‑time protection suite built to safeguard autonomous AI agents across finance sector, healthcare and other high‑risk enterprises. What Straiker announced On May 5, 2026, Straiker announced that CB Insights has named it to the AI 100, a curated ranking of the world’s most promising private... Read More
Sentra‑Wiz integration adds data‑sensitivity to cloud security
Sentra‑Wiz integration adds data‑sensitivity layer to cloud‑security findings. The New York‑based data‑security platform Sentra announced a partnership with Wiz—now part of Google Cloud—that injects continuous, AI‑driven data classification into the Wiz Security Graph. The move promises to give enterprises a clearer view of where sensitive data lives behind cloud‑infrastructure risks, a capability that could become a... Read More
Synack Glasswing‑Readiness Assessment Tackles AI Attack Gaps
Synack announced the launch of its Glasswing‑Readiness Assessment, a new service that pairs the company’s autonomous Red Agent, Sara, with human‑led Red Team expertise to map and validate an organization’s attack surface before next‑generation offensive AI driven models—such as Anthropic’s Project Glasswing or Mythos—can exploit it. What the Glasswing‑Readiness Assessment Is The Glasswing‑Readiness Assessment is a... Read More
Pipeguard security platform wins Global Tech Award 2026
SOFTSWISS, the Malta‑based iGaming software provider, captured the Global Tech Award 2026 in the Cyber Security Technology category for its home‑grown Pipeguard platform. The accolade shines a spotlight on a security solution that is baked into the software development lifecycle rather than bolted on after the fact. Pipeguard is more than a static code‑analysis tool.... Read More
BigID Wins Forrester Wave Leader, Launches AI‑Powered Suite
BigID — the data-security and AI-governance platform that recently topped The Forrester Wave™ for Sensitive Data Discovery and Classification Solutions—announced its leader status alongside four new AI-driven capabilities at RSA Conference 2026. The move signals a strategic push to embed generative-AI and autonomous controls into enterprise data protection, a shift that could reshape how security,... Read More
Kyndryl Foundation expands global grant program to 13 countries
Kyndryl’s charitable arm, the Kyndryl Foundation, has disclosed the recipients of its third‑year grant program, extending its reach to 13 countries with the addition of France and Mexico. The initiative, now in its third cycle, is designed to accelerate the development of cybersecurity and artificial intelligence (AI) expertise among underserved populations, with the foundation projecting... Read More
Dashlane‑KnowBe4 Real‑Time Credential Security
A recent Dashlane study shows that roughly 33 percent of corporate logins rely on weak or compromised credentials that sit outside single‑sign‑on (SSO) coverage and are not protected by any password‑manager vault. Those hidden credentials are invisible to most IT and security teams, creating a blind spot that attackers can exploit. By coupling real‑time risk detection with... Read More
15 49.0138 8.38624 both both 1 3000 1 1 horizontal https://techedgeai.com 300 true 0 1