IT Security Guru

IT Security Guru

Publication
0 followers

Independent UK site covering cyber leadership, diversity, and emerging issues for CISOs.

Routers Replace PCs as Primary Threat Vector in Evolving Device Risk Landscape
NewsMar 23, 2026

Routers Replace PCs as Primary Threat Vector in Evolving Device Risk Landscape

Forescout’s 2026 Riskiest Connected Devices report shows routers have overtaken PCs as the top enterprise threat vector, accounting for roughly one‑third of critical vulnerabilities. On average, routers and switches now expose about 32 flaws each, and 75% of the riskiest...

By IT Security Guru
Black Duck Launches Signal to Tackle the Security Risks of AI-Generated Code
NewsMar 23, 2026

Black Duck Launches Signal to Tackle the Security Risks of AI-Generated Code

Black Duck announced the general availability of Black Duck Signal, an AI‑driven application security platform built to protect code generated by AI coding assistants. Unlike traditional rule‑based AST tools, Signal employs a suite of specialized AI agents powered by the...

By IT Security Guru
Q&A: “If It’s Not Secure, You Can’t Trust It”
NewsMar 23, 2026

Q&A: “If It’s Not Secure, You Can’t Trust It”

Dewayne Hart, a former U.S. Navy chief and founder of Secure Managed Instructional Systems, emphasizes that trustworthy AI must be built with security‑by‑design. He identifies phishing, ransomware, and third‑party vendor risk as the most damaging cyber threats facing enterprises today....

By IT Security Guru
Forescout Reports Strong Growth and Profitability in FY2025
NewsMar 20, 2026

Forescout Reports Strong Growth and Profitability in FY2025

Forescout Technologies reported robust FY2025 results, adding over 230 net new customers and closing 58 deals worth $1 million or more, a 26% increase year‑over‑year. Revenue growth was strong across financial services (up 25%) and healthcare (up 24%), while gross dollar...

By IT Security Guru
Salt Security Launches Agentic Security Platform for the AI Stack Across LLMs, MCP Servers and APIs
NewsMar 19, 2026

Salt Security Launches Agentic Security Platform for the AI Stack Across LLMs, MCP Servers and APIs

Salt Security unveiled the Agentic Security Platform, a unified solution that protects the entire AI agent stack—including large language models (LLMs), MCP servers, and APIs—by mapping their interconnections into an Agentic Security Graph. The platform adds two core capabilities: Agentic...

By IT Security Guru
Huntress Launches Two New Security Posture Tools as Cyber Threats Surge
NewsMar 17, 2026

Huntress Launches Two New Security Posture Tools as Cyber Threats Surge

Huntress announced Managed Endpoint Security Posture Management (ESPM) and Managed Identity Security Posture Management (ISPM), expanding its platform beyond reactive detection. The tools address a 277% surge in RMM abuse and rising identity‑based threats by proactively hardening endpoints and Microsoft...

By IT Security Guru
Top AI SOC Analyst Platforms in 2026
NewsMar 12, 2026

Top AI SOC Analyst Platforms in 2026

The 2026 roundup evaluates ten AI‑SOC analyst platforms against five criteria—autonomy, time‑to‑value, explainability, integration, and investigation depth. Prophet Security emerges as the clear leader, offering fully agentic AI, day‑one deployment, transparent reasoning, and vendor‑agnostic integration. Palo Alto’s Cortex XSIAM provides...

By IT Security Guru
KnowBe4 Launches AI Agent to Tailor Security Awareness Assessments
NewsMar 11, 2026

KnowBe4 Launches AI Agent to Tailor Security Awareness Assessments

KnowBe4 has added a Custom SAPA AI Agent to its AIDA platform, enabling organizations to generate security awareness assessments that reflect their unique technology environments, policies, and workflows. The AI-driven tool creates dynamic, real‑world scenario questions and provides per‑question analytics,...

By IT Security Guru
Keeper Security Launches Global Campaign Highlighting Identity-First Cybersecurity with Atlassian Williams F1 Team
NewsMar 11, 2026

Keeper Security Launches Global Campaign Highlighting Identity-First Cybersecurity with Atlassian Williams F1 Team

Keeper Security has launched a global marketing campaign with the Atlassian Williams Formula 1 team to promote identity‑first cybersecurity. The initiative, timed with the start of the 2026 F1 season, includes TV spots and digital content featuring driver Alex Albon and highlights...

By IT Security Guru
Forescout Introduces Automated Security Controls Assessment to Bring Continuous Compliance Visibility
NewsMar 10, 2026

Forescout Introduces Automated Security Controls Assessment to Bring Continuous Compliance Visibility

Forescout has added Automated Security Controls Assessment to its 4D Platform, replacing manual spreadsheet‑driven audits with continuous, real‑time evidence collection. The feature leverages live telemetry from IT, OT, IoT and IoMT devices to evaluate security controls against the CIS Benchmarks....

By IT Security Guru
Why AI Security Is Emerging as the Fourth Pillar of Cybersecurity
NewsMar 9, 2026

Why AI Security Is Emerging as the Fourth Pillar of Cybersecurity

The article argues that AI security is becoming the fourth pillar of cybersecurity, driven by the rise of autonomous agents that operate primarily through APIs. Traditional pillars—endpoint, network, and cloud—were built for earlier computing shifts and lack the controls needed...

By IT Security Guru
Next Gen Spotlights: Preparing for a Post-Quantum World – Q&A with Cavero Quantum
NewsMar 5, 2026

Next Gen Spotlights: Preparing for a Post-Quantum World – Q&A with Cavero Quantum

Cavero Quantum, a University of Leeds spin‑out, has developed post‑quantum cryptography and password‑less authentication that can run on ultra‑constrained devices such as SIM cards. Backed by the UK government’s CyberASAP programme, the startup moved from a funded demo to real‑world...

By IT Security Guru
Keeper Security Launches Native Jira Integrations
NewsMar 4, 2026

Keeper Security Launches Native Jira Integrations

Keeper Security announced two native Atlassian Jira integrations that embed security incident response and privileged‑access governance directly into Jira workflows. The Forge‑based Jira ITSM app auto‑creates tickets from Keeper alerts, while the Jira Workflow app lets teams request and approve...

By IT Security Guru
The Top Exposure Assessment Platforms (EAPs) to Watch in 2026
NewsMar 3, 2026

The Top Exposure Assessment Platforms (EAPs) to Watch in 2026

Exposure management is overtaking traditional scan‑and‑patch models, emphasizing unified visibility, context, and remediation across IT, cloud, identity, and OT. The article reviews six leading Exposure Assessment Platforms (EAPs) for 2026, highlighting Tenable One as the market leader, with challengers such...

By IT Security Guru
Talion Expands Governance-Aligned Agentic SOC as Board Cyber Scrutiny Intensifies
NewsMar 3, 2026

Talion Expands Governance-Aligned Agentic SOC as Board Cyber Scrutiny Intensifies

Talion, an MSSP spun out of BAE Systems, announced under CEO Keven Knight an expanded governance‑aligned Agentic SOC that embeds board‑level oversight into managed cyber defence. The model integrates automation, human expertise and real‑time governance, giving executives transparency and regulatory...

By IT Security Guru
Forescout and Netskope Deliver Universal Zero Trust Integration Across Managed and Unmanaged Devices
NewsFeb 26, 2026

Forescout and Netskope Deliver Universal Zero Trust Integration Across Managed and Unmanaged Devices

Forescout Technologies and Netskope announced a strategic integration that unifies Zero Trust security across managed and unmanaged devices, including IT, OT, IoT, and IoMT assets. The solution merges Forescout’s real‑time device intelligence with Netskope’s AI‑driven cloud security to enforce consistent...

By IT Security Guru
AI-Driven Development Fuels Surge in Open Source Vulnerabilities, Black Duck Finds
NewsFeb 26, 2026

AI-Driven Development Fuels Surge in Open Source Vulnerabilities, Black Duck Finds

Black Duck's 2026 Open Source Security and Risk Analysis report finds open source vulnerabilities in commercial codebases have more than doubled year‑on‑year. The average application now contains 581 vulnerabilities, a 107% increase, with 98% of codebases using open source components....

By IT Security Guru
Forescout Partners with E-ISAC to Bring Threat Intelligence and Research to North American Utilities
NewsFeb 23, 2026

Forescout Partners with E-ISAC to Bring Threat Intelligence and Research to North American Utilities

Forescout Technologies has become a vendor affiliate of the North American Electricity Information Sharing and Analysis Center (E‑ISAC), extending its threat‑intelligence sharing to U.S. utilities and grid operators. Through its Vedere Labs research unit, the company will feed cyber and...

By IT Security Guru
UK Government-Backed Cyber Security Programme Alumni Raise £47.4m in Follow-On Investment
NewsFeb 23, 2026

UK Government-Backed Cyber Security Programme Alumni Raise £47.4m in Follow-On Investment

Innovate UK’s Cyber Security Academic Startup Accelerator (CyberASAP) alumni have attracted £47.4 million in post‑programme funding over the past nine years, with private capital accounting for 68% of that amount. The accelerator, funded by the Department for Science, Innovation and Technology,...

By IT Security Guru
Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security
NewsFeb 20, 2026

Check Point Software Earns Leader & Fast Mover Position in GigaOm Radar for Cloud Network Security

Check Point Software has been named a Leader and Fast Mover in the GigaOm Radar for Cloud Network Security 2025, marking its third consecutive year at the top. GigaOm highlighted the company’s prevention‑first Infinity architecture, unified cloud security platform, and...

By IT Security Guru
Q&A: Organisations Are Spending Millions on Cybersecurity and Still Getting It Wrong
NewsFeb 20, 2026

Q&A: Organisations Are Spending Millions on Cybersecurity and Still Getting It Wrong

Organizations are pouring billions into cybersecurity yet continue to suffer breaches because they treat security as a purely technical issue. Senior cyber leader Purvi Kay argues that weak governance, poor communication, and unclear accountability are the primary failures. She emphasizes...

By IT Security Guru
When DORA Goes From Afterthought to Commercial Imperative
NewsFeb 17, 2026

When DORA Goes From Afterthought to Commercial Imperative

In mid‑2025, DORA has shifted from a peripheral concern to a commercial imperative for European firms. Companies now see DORA clauses in supplier questionnaires and contract negotiations, with non‑compliance jeopardising deals. The toughest obstacles are supplier oversight, costly threat‑led penetration...

By IT Security Guru
Keeper Commander Introduces SuperShell™
NewsFeb 12, 2026

Keeper Commander Introduces SuperShell™

Keeper Security launched SuperShell™, a full‑screen terminal user interface for Keeper Commander, available from version 17.2.7 onward. The TUI provides a split‑view vault browser with vi‑style keyboard shortcuts, searchable panes, raw JSON inspection, and live TOTP display. Designed for developers,...

By IT Security Guru
Black Duck Signs MSSP Agreement with Accenture
NewsFeb 11, 2026

Black Duck Signs MSSP Agreement with Accenture

Black Duck announced a managed security service provider (MSSP) agreement with Accenture, designating the Black Duck Polaris platform as the standard tool for Accenture’s Application Security Practice. Polaris combines static, dynamic, and software composition analysis into a single SaaS offering,...

By IT Security Guru
EU Commission Breach – The Importance of Upholding Strong Device Management Infrastructure
NewsFeb 11, 2026

EU Commission Breach – The Importance of Upholding Strong Device Management Infrastructure

Last week the European Commission disclosed a cyberattack that compromised its mobile device management (MDM) platform, exposing staff names and phone numbers. Security experts from Huntress, Keeper Security, and CyberSmart warned that MDM systems are now a primary attack vector,...

By IT Security Guru