<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity Archives - ITDigest</title>
	<atom:link href="https://itdigest.com/topic/information-communications-technology/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://itdigest.com/topic/information-communications-technology/cybersecurity/</link>
	<description>IT Explained</description>
	<lastBuildDate>Thu, 30 Apr 2026 10:22:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://itdigest.com/wp-content/uploads/2025/07/cropped-ITDIGEST-LOGO-01-1-copy-1-32x32.png</url>
	<title>Cybersecurity Archives - ITDigest</title>
	<link>https://itdigest.com/topic/information-communications-technology/cybersecurity/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Malwarebytes Integrates Real-Time Scam Detection into Claude AI Conversations</title>
		<link>https://itdigest.com/information-communications-technology/cybersecurity/malwarebytes-integrates-real-time-scam-detection-into-claude-ai-conversations/</link>
		
		<dc:creator><![CDATA[ITDigest Bureau]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 10:22:57 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Information and Communications Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Claude AI Conversations]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[Malwarebytes]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[scam-detection]]></category>
		<category><![CDATA[threat intelligence.]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=79965</guid>

					<description><![CDATA[<p>Malwarebytes has launched an integration, enabling its threat intelligence to be applied within the AI ecosystem by offering a free connector for Anthropic’s Claude. With the aid of Malwarebytes’ connector, users will be able to detect scamming activities and examine suspicious content right in the conversation box without leaving the AI chat. Thanks to the [&#8230;]</p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/malwarebytes-integrates-real-time-scam-detection-into-claude-ai-conversations/" data-wpel-link="internal">Malwarebytes Integrates Real-Time Scam Detection into Claude AI Conversations</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Malwarebytes has launched an integration, enabling its threat intelligence to be applied within the AI ecosystem by offering a free connector for Anthropic’s Claude. With the aid of Malwarebytes’ connector, users will be able to detect scamming activities and examine suspicious content right in the conversation box without leaving the AI chat.</p>
<p>Thanks to the connector, a user is able to quickly validate a link, phone number, email address, or domain, making sure that any phishing or other scamming attempts do not occur. The combination of AI technologies and Malwarebytes’ vast knowledge base enables the software to check not only technical but also contextual aspects related to scams (including manipulative speech patterns).</p>
<p>Such an innovation is quite understandable in today&#8217;s environment when scams do not necessarily contain obvious mistakes, relying rather on very convincing messaging. Indeed, according to Malwarebytes, around 19 percent of users of the company’s Scam Guard have already managed to avoid high-risk scams with the help of this tool.</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/information-communications-technology/cybersecurity/crowdstrike-launches-project-quiltworks-to-tackle-ai-driven-cybersecurity-risks/" target="_self" rel="bookmark" data-wpel-link="internal">CrowdStrike Launches Project QuiltWorks to Tackle AI-Driven Cybersecurity Risks</a> </strong></h4>
<p>&#8220;The use of AI has opened up new areas for cybercriminals to target, and combined with manipulative language or images, no one is too smart to fall victim,&#8221; said Marcin Kleczynski, Founder and CEO, Malwarebytes. &#8220;We are tackling scams from every angle, helping people answer the question, &#8216;is this a scam&#8217; and providing clear, easy-to-understand support on what to do next. By integrating Malwarebytes with Claude, we&#8217;re putting enterprise-grade threat and scam detection into the hands of anyone who needs it, right when and where they need it most, meeting people where they are to truly make an impact on scams.&#8221;</p>
<p>This connection provides verdicts that are very clear, which include “Malicious,” “Potentially Malicious,” “Unknown,” and “Safe.” This connector will provide some explanation along with the verdicts. Another important feature is that this connector enables multi-threat analysis, which means that it can analyze images along with text within one query.</p>
<p>As cyber threats increasingly target individuals through messaging platforms and social media, <a href="https://www.malwarebytes.com/home-cnet-hl" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">Malwarebytes</a>’ integration positions AI assistants as a frontline defense, making advanced security tools more accessible to everyday users.</p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/malwarebytes-integrates-real-time-scam-detection-into-claude-ai-conversations/" data-wpel-link="internal">Malwarebytes Integrates Real-Time Scam Detection into Claude AI Conversations</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Alchemy Technology Group Expands Cybersecurity Capabilities with IOvations Acquisition</title>
		<link>https://itdigest.com/quick-byte/alchemy-technology-group-expands-cybersecurity-capabilities-with-iovations-acquisition/</link>
		
		<dc:creator><![CDATA[ITDigest Bureau]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 11:49:30 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Information and Communications Technology]]></category>
		<category><![CDATA[Quick Byte]]></category>
		<category><![CDATA[Acquisition]]></category>
		<category><![CDATA[Alchemy Technology Group]]></category>
		<category><![CDATA[cloud security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[IOvations]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[threat detection]]></category>
		<category><![CDATA[Zero Trust architectures]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=79852</guid>

					<description><![CDATA[<p>Alchemy Technology Group has acquired IOvations, a cybersecurity provider from Massachusetts. This move helps Alchemy expand its services and reach in the Northeast. It enhances Alchemy’s strengths in cloud security, threat detection, and Zero Trust architectures. The acquisition also brings IOvations’ strong customer relationships and technical know-how. Now, Alchemy can provide more IT and cybersecurity [&#8230;]</p>
<p>The post <a href="https://itdigest.com/quick-byte/alchemy-technology-group-expands-cybersecurity-capabilities-with-iovations-acquisition/" data-wpel-link="internal">Alchemy Technology Group Expands Cybersecurity Capabilities with IOvations Acquisition</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Alchemy Technology Group has acquired IOvations, a cybersecurity provider from Massachusetts. This move helps Alchemy expand its services and reach in the Northeast. It enhances Alchemy’s strengths in cloud security, threat detection, and Zero Trust architectures. The acquisition also brings IOvations’ strong customer relationships and technical know-how. Now, Alchemy can provide more IT and cybersecurity services. They still maintain the specialized focus that IOvations’ clients trust. “IOvations is a perfect fit in our acquisition strategy,” said Wes Davis, Co-CEO and Co-Founder of Alchemy Technology Group.</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/quick-byte/atos-integrates-google-threat-intelligence-to-strengthen-ai-driven-cyber-defense/" target="_self" rel="bookmark" data-wpel-link="internal">Atos Integrates Google Threat Intelligence to Strengthen AI-Driven Cyber Defense</a></strong></h4>
<p>“They have a terrific, longstanding customer base in a dynamic growth market for us. We love quality businesses built on the same core principals as Alchemy: trusted relationships, elite domain expertise, and a history of execution.” For IOvations customers, the integration offers expanded access to cloud, data, AI, and app development. It won’t disrupt current relationships. This is Alchemy’s second acquisition in recent months. It strengthens their plan to create a national IT services platform through targeted growth.</p>
<h4><strong>Read More: <a href="https://www.prnewswire.com/news-releases/alchemy-technology-group-acquires-iovations-to-grow-its-northeast-presence-302752178.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">Alchemy Technology Group Acquires IOvations to Grow Its Northeast Presence</a></strong></h4>
<p>The post <a href="https://itdigest.com/quick-byte/alchemy-technology-group-expands-cybersecurity-capabilities-with-iovations-acquisition/" data-wpel-link="internal">Alchemy Technology Group Expands Cybersecurity Capabilities with IOvations Acquisition</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Point Wild Appoints Neill Feather Chief Executive Officer</title>
		<link>https://itdigest.com/information-communications-technology/cybersecurity/point-wild-appoints-neill-feather-chief-executive-officer/</link>
		
		<dc:creator><![CDATA[News Desk]]></dc:creator>
		<pubDate>Mon, 27 Apr 2026 11:49:21 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Information and Communications Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[appointment]]></category>
		<category><![CDATA[Chief Executive Officer]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[Point Wild]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=79841</guid>

					<description><![CDATA[<p>Point Wild, a leading global provider of AI-powered cybersecurity, announced the appointment of Neill Feather to Chief Executive Officer. Hari Ravichandran, who has served as CEO since founding the company, will transition to Chairman of the Board, where he will continue to support the company&#8217;s long-term strategy and growth. Feather, who previously served as President [&#8230;]</p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/point-wild-appoints-neill-feather-chief-executive-officer/" data-wpel-link="internal">Point Wild Appoints Neill Feather Chief Executive Officer</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Point Wild, a leading global provider of AI-powered cybersecurity, announced the appointment of Neill Feather to Chief Executive Officer. Hari Ravichandran, who has served as CEO since founding the company, will transition to Chairman of the Board, where he will continue to support the company&#8217;s long-term strategy and growth.</p>
<p>Feather, who previously served as President and Chief Operating Officer, has played a central role in shaping Point Wild&#8217;s strategic direction, leading M&amp;A and scaling operations across the company&#8217;s portfolio. His appointment reflects a natural progression of leadership as the company enters its next phase of growth.</p>
<p>&#8220;Neill has played an instrumental role in establishing Point Wild as a global leader in cybersecurity and growing it into the AI-powered platform it is today,&#8221; said Hari Ravichandran, Founder &amp; incoming Chairman of Point Wild. &#8220;He brings a rare combination of operational rigor, strategic vision and deep industry expertise. I have full confidence in his leadership as the company continues to scale and capture the significant opportunity ahead.&#8221;</p>
<p><strong>Also Read: <a class="p-url" href="https://itdigest.com/information-communications-technology/cybersecurity/censys-powers-soc-modernization-with-new-integrations-across-ai-soar-and-threat-intelligence-ecosystems/" target="_self" rel="bookmark" data-wpel-link="internal">Censys Powers SOC Modernization with New Integrations Across AI, SOAR, and Threat Intelligence Ecosystems</a> </strong></p>
<p>Under Feather&#8217;s leadership as President and COO, Point Wild has achieved significant growth and scale. The company is expected to generate more than $650 million in annual revenue, growing at more than 20 percent. Today, Point Wild has an enterprise value of $2 billion, reflecting the strength of its platform and continued momentum across its business.</p>
<p>Feather brings more than two decades of experience at the intersection of cybersecurity, SaaS and M&amp;A. Prior to joining Point Wild, he was a founding member and CEO of SiteLock, where he scaled the company into the world&#8217;s largest provider of website security solutions, protecting more than 16 million websites globally. Under his leadership, SiteLock expanded through product innovation, international growth and targeted acquisitions, culminating in a successful exit to private equity.</p>
<p>&#8220;It&#8217;s an incredibly important moment for Point Wild as we scale our AI-platform and diversify our go to market strategy, and I&#8217;m excited to continue working closely with our teams driving that work,&#8221; said Feather, incoming CEO of <a href="https://www.pointwild.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">Point Wild</a>. &#8220;We&#8217;ve built a strong foundation—now it&#8217;s time to execute, deepening our capabilities and delivering long-term value for our customers, partners and investors.&#8221;</p>
<p>As Chairman, Ravichandran will remain closely involved in guiding the company&#8217;s strategic priorities and supporting its continued expansion.</p>
<p><strong>Source: <a href="https://www.prnewswire.com/news-releases/point-wild-appoints-neill-feather-chief-executive-officer-302752452.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">PRNewswire</a></strong></p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/point-wild-appoints-neill-feather-chief-executive-officer/" data-wpel-link="internal">Point Wild Appoints Neill Feather Chief Executive Officer</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CrowdStrike Launches Project QuiltWorks to Tackle AI-Driven Cybersecurity Risks</title>
		<link>https://itdigest.com/information-communications-technology/cybersecurity/crowdstrike-launches-project-quiltworks-to-tackle-ai-driven-cybersecurity-risks/</link>
		
		<dc:creator><![CDATA[ITDigest Bureau]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 11:53:47 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Information and Communications Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[AI detection]]></category>
		<category><![CDATA[CrowdStrike]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybersecurity risks]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[Project QuiltWorks]]></category>
		<category><![CDATA[software vulnerabilities]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=79823</guid>

					<description><![CDATA[<p>CrowdStrike has launched Project QuiltWorks, a new collaborative effort across the industry to fight against the rapidly increasing number of software vulnerabilities discovered by highly advanced AI models. This coalition unites big industry players such as Accenture, EY, IBM, Cybersecurity Services Kroll, OpenAI, and other partners to assist companies in detecting and handling effectively the [&#8230;]</p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/crowdstrike-launches-project-quiltworks-to-tackle-ai-driven-cybersecurity-risks/" data-wpel-link="internal">CrowdStrike Launches Project QuiltWorks to Tackle AI-Driven Cybersecurity Risks</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>CrowdStrike has launched Project QuiltWorks, a new collaborative effort across the industry to fight against the rapidly increasing number of software vulnerabilities discovered by highly advanced AI models. This coalition unites big industry players such as Accenture, EY, IBM, Cybersecurity Services Kroll, OpenAI, and other partners to assist companies in detecting and handling effectively the new security risks unleashed by leading AI technologies.</p>
<p>AI is getting smarter day by day and with that, it is getting better at uncovering even the most complex errors in software code such as logical errors, security misconfigurations, and arcane hacking methods. This leads to faster discovery of software vulnerabilities but on the other hand, less time for organizations to take countermeasures before the threats materialize. Project QuiltWorks aims to bridge this difference by integrating AI detection and expert-led, well-coordinated remediations.</p>
<p>“As frontier AI accelerates vulnerability discovery, every board in the world is asking their CISO the same question: are we exposed and are we protected?” said George Kurtz, CEO and founder of CrowdStrike. “Project QuiltWorks is how the industry comes together to give every organization the answer their board needs.”</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/information-communications-technology/cybersecurity/silverfort-and-sentinelone-join-forces-to-strengthen-identity-security-in-the-ai-era/" target="_self" rel="bookmark" data-wpel-link="internal">Silverfort and SentinelOne Join Forces to Strengthen Identity Security in the AI Era</a></strong></h4>
<p>Central to the initiative is CrowdStrike’s Falcon platform, which processes vast volumes of security data daily to identify real-world attack patterns and prioritize the most critical vulnerabilities. By integrating insights from leading AI labs and cybersecurity experts, the coalition aims to deliver actionable intelligence that goes beyond traditional risk scoring methods.</p>
<p>To further help achieve this goal, <a href="https://www.crowdstrike.com/en-us/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">CrowdStrike</a> has also launched the Frontier AI Readiness &amp; Resilience Service. In this service, CrowdStrike offers continuous evaluations using AI-based scanning technology and analysis to understand the current status of security within an organization. This service comes with risk prioritization according to their exploitation and business value, along with recommended remedies for enterprises.</p>
<p>Project QuiltWorks, by virtue of its access to a worldwide network of certified experts, can leverage the power of the Frontier service for different industries as well. With AI increasingly becoming a part of the digital world, Project QuiltWorks emphasizes how essential such collaboration is in today’s world.</p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/crowdstrike-launches-project-quiltworks-to-tackle-ai-driven-cybersecurity-risks/" data-wpel-link="internal">CrowdStrike Launches Project QuiltWorks to Tackle AI-Driven Cybersecurity Risks</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Censys Powers SOC Modernization with New Integrations Across AI, SOAR, and Threat Intelligence Ecosystems</title>
		<link>https://itdigest.com/information-communications-technology/cybersecurity/censys-powers-soc-modernization-with-new-integrations-across-ai-soar-and-threat-intelligence-ecosystems/</link>
		
		<dc:creator><![CDATA[News Desk]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 11:53:37 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Information and Communications Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Censys]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Internet intelligence]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[Security Operations]]></category>
		<category><![CDATA[SOC Modernization]]></category>
		<category><![CDATA[threat intelligence.]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=79814</guid>

					<description><![CDATA[<p>Censys, the authoritative Internet intelligence platform, announced new integrations across AI, SIEM, SOAR, and threat intelligence platforms, bringing global Internet infrastructure visibility directly into security operations workflows. By embedding Censys intelligence into core workflows, organizations can quickly understand the context and risk of IPs, domains, and services, enabling faster response and more effective security operations. [&#8230;]</p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/censys-powers-soc-modernization-with-new-integrations-across-ai-soar-and-threat-intelligence-ecosystems/" data-wpel-link="internal">Censys Powers SOC Modernization with New Integrations Across AI, SOAR, and Threat Intelligence Ecosystems</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Censys, the authoritative Internet intelligence platform, announced new integrations across AI, SIEM, SOAR, and threat intelligence platforms, bringing global Internet infrastructure visibility directly into security operations workflows.</p>
<p>By embedding Censys intelligence into core workflows, organizations can quickly understand the context and risk of IPs, domains, and services, enabling faster response and more effective security operations.</p>
<p>&#8220;As adversaries leverage AI to operate at Internet scale, security teams must move faster to keep pace,&#8221; said Sarah Ashburn, Chief Revenue Officer of Censys. &#8220;Censys provides security operations teams with complete external visibility into adversary infrastructure. By investing in partner integrations, we embed these insights directly into the tools teams already use to reduce response times and operate at scale.&#8221;</p>
<p>New releases include native integrations with Cisco Splunk SOAR and ES, Microsoft Sentinel, and Google SecOps. Censys also expanded its ecosystem through new partner-built integrations with Palo Alto Cortex, Filigran OpenCTI, Maltego, Dropzone AI, and others, extending automation and visibility across modern security operations platforms.</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/quick-byte/atos-integrates-google-threat-intelligence-to-strengthen-ai-driven-cyber-defense/" target="_self" rel="bookmark" data-wpel-link="internal">Atos Integrates Google Threat Intelligence to Strengthen AI-Driven Cyber Defense</a></strong></h4>
<p>Joint customers benefit from:</p>
<ul type="disc">
<li><b>Automated alert enrichment</b> with external infrastructure context to accelerate triage.</li>
<li><b>Faster investigation and validation</b> of security alerts using attacker-observable data.</li>
<li><b>Automated response and remediation workflows</b> through SOAR playbooks and ticketing systems.</li>
<li><b>Improved operational collaboration</b> across SOC, threat intelligence, and incident response teams.</li>
</ul>
<p>&#8220;Censys&#8217; Internet intelligence adds critical visibility to our security workflows, helping customers respond to threats faster and with greater confidence,&#8221; said Rik Esselink, Chief Revenue Officer at Maltego. &#8220;Our partnership expansion reflects the growing importance of unified security platforms across threat intelligence, AI automation, and external attack surface visibility.&#8221;</p>
<p>&#8220;Integrating Censys&#8217; real-time Internet visibility directly into OpenCTI gives our joint customers the external context they need to move from raw threat data to confident, prioritized action. Together, we&#8217;re closing the gap between intelligence and response,&#8221; said Jan Johansen, SVP of Global Alliances and Channels at Filigran.</p>
<p>&#8220;With Censys, our AI SOC analysts have high-fidelity Internet Intelligence that gives them more context to investigate alerts, respond to attacks, and deliver faster outcomes at scale,&#8221; said Shashi Nair, Head of Global Channel at Dropzone AI.</p>
<p>&#8220;We&#8217;ve built an enterprise-ready partner program that spotlights and supports the security community,&#8221; said Celestine Jahren, Director of Strategic Alliances at Censys. &#8220;This quarter, we&#8217;re launching our partner spotlight series to highlight how our partner ecosystem is delivering critical insights to customers. By equipping partners with high-fidelity Internet intelligence and the support to leverage it, we&#8217;re turning collaboration into measurable impact for customers.&#8221;</p>
<p><a href="https://search.censys.io/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">Censys</a> and its partners now offer 55+ integrations across 45+ technology alliance partners. These integrations reinforce Censys&#8217; role as the foundational intelligence layer across the SOC ecosystem, delivering the external context needed to power security operations at the speed and scale of today&#8217;s threats.</p>
<p><strong>Source: <a href="https://www.prnewswire.com/news-releases/censys-powers-soc-modernization-with-new-integrations-across-ai-soar-and-threat-intelligence-ecosystems-302751280.html" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">PRNewswire</a></strong></p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/censys-powers-soc-modernization-with-new-integrations-across-ai-soar-and-threat-intelligence-ecosystems/" data-wpel-link="internal">Censys Powers SOC Modernization with New Integrations Across AI, SOAR, and Threat Intelligence Ecosystems</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Silverfort and SentinelOne Join Forces to Strengthen Identity Security in the AI Era</title>
		<link>https://itdigest.com/information-communications-technology/cybersecurity/silverfort-and-sentinelone-join-forces-to-strengthen-identity-security-in-the-ai-era/</link>
		
		<dc:creator><![CDATA[ITDigest Bureau]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 12:39:42 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Information and Communications Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[cyber-threats]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[identity security]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[Runtime Security]]></category>
		<category><![CDATA[SentinelOne]]></category>
		<category><![CDATA[Silverfort]]></category>
		<category><![CDATA[threat detection]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=79779</guid>

					<description><![CDATA[<p>Silverfort and SentinelOne have teamed up to form a strategic partnership that will address one of the biggest cybersecurity threats worldwide: securing identities in AI-driven and automated environments. This collaboration will harness Silverfort&#8217;s identity protection capabilities and SentinelOne&#8217;s AI-driven threat detection to deliver a consolidated security system capable of safeguarding human users, machines, and AI [&#8230;]</p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/silverfort-and-sentinelone-join-forces-to-strengthen-identity-security-in-the-ai-era/" data-wpel-link="internal">Silverfort and SentinelOne Join Forces to Strengthen Identity Security in the AI Era</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Silverfort and SentinelOne have teamed up to form a strategic partnership that will address one of the biggest cybersecurity threats worldwide: securing identities in AI-driven and automated environments. This collaboration will harness Silverfort&#8217;s identity protection capabilities and SentinelOne&#8217;s AI-driven threat detection to deliver a consolidated security system capable of safeguarding human users, machines, and AI agents.</p>
<p>Due to the integration of AI, the number of non-human identities has rapidly increased in enterprises. Besides humans, there are now other types of identities such as AI agents, service accounts, and APIs. These entities work efficiently at machine speed often without human intervention which brings about the risk of exploitation. The recent high-profile cases prove the need for immediate action. One of them involved a supply chain attack that exploited npm credentials and led to the infection in only a few seconds. The other one was about a piece of malicious software created by an autonomous coding assistant that was detected and removed in less than a minute. These incidents emphasize the necessity for real-time and automated security response.</p>
<p>The collaborative product aims at protecting identities during their lifetime, and thus, helping organizations detect and stop threats immediately. With the combination of Silverfort&#8217;s identity security measures such as multi-factor authentication, just-in-time access, and adaptive policies and SentinelOne&#8217;s AI-powered detection features, this partnership will not only help respond to threats quickly but also prevent their spread inside networks.</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/information-communications-technology/cybersecurity/tekstream-expands-digital-resilience-capabilities-with-imaginex-cybersecurity-acquisition/" target="_self" rel="bookmark" data-wpel-link="internal">TekStream Expands Digital Resilience Capabilities with ImagineX Cybersecurity Acquisition</a></strong></h4>
<p>&#8220;Security architectures built around isolated tools are failing to keep up with modern threats,” said Ron Rasin, Chief Strategy Officer, Silverfort. “By unifying runtime identity enforcement with autonomous AI Security, we are helping organizations stop identity-driven attacks before damage occurs, and preparing them to secure the next generation of AI-powered environments. Together, this joint solution enables organizations to secure their entire environment from a single platform, consistently across both cloud and on-premises environments.”</p>
<p>The partnership is also focused on aligning its technical capabilities and innovating. The merged platform provides a unified control plane to correlate identity and endpoint information, facilitating immediate enforcement and automation.</p>
<p>“In cybersecurity, the strongest defense is a unified one,” said Melissa K. Smith, SVP of Global Strategic Partnerships &amp; Initiatives, <a href="https://www.sentinelone.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">SentinelOne</a>. “By joining forces with <a href="https://www.silverfort.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">Silverfort</a>, we’re moving beyond traditional boundaries to create a security ecosystem that is truly autonomous. We want to take the guesswork out of identity protection. Together, we’re delivering a level of visibility and real-time enforcement that neither identity nor endpoint tools could achieve alone, ensuring our customers remain resilient in an increasingly complex threat landscape.”</p>
<p>With cyber threats evolving alongside AI adoption, this partnership positions both companies at the forefront of securing the modern, autonomous enterprise.</p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/silverfort-and-sentinelone-join-forces-to-strengthen-identity-security-in-the-ai-era/" data-wpel-link="internal">Silverfort and SentinelOne Join Forces to Strengthen Identity Security in the AI Era</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Exabeam Extends Agent Behavior Analytics to the Google Cloud Agent Ecosystem</title>
		<link>https://itdigest.com/information-communications-technology/cybersecurity/exabeam-extends-agent-behavior-analytics-to-the-google-cloud-agent-ecosystem/</link>
		
		<dc:creator><![CDATA[News Desk]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 12:39:34 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Information and Communications Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Agent Behavior Analytics]]></category>
		<category><![CDATA[Agent Development Kit]]></category>
		<category><![CDATA[Anomaly Detection]]></category>
		<category><![CDATA[behavior intelligence]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Exabeam]]></category>
		<category><![CDATA[Gemini Enterprise]]></category>
		<category><![CDATA[Google Cloud Agent]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[news]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=79766</guid>

					<description><![CDATA[<p>Exabeam, the leader in behavior intelligence for the agentic enterprise, announced new Exabeam Agent Behavior Analytics (ABA) capabilities for agents built with Google Cloud’s Agent Development Kit (ADK) and an integration framework with Google Agent Gateway, establishing Exabeam at the forefront of securing enterprises as they adopt agentic workflows. This update extends Exabeam ABA across the Google agent ecosystem, [&#8230;]</p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/exabeam-extends-agent-behavior-analytics-to-the-google-cloud-agent-ecosystem/" data-wpel-link="internal">Exabeam Extends Agent Behavior Analytics to the Google Cloud Agent Ecosystem</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Exabeam, the leader in behavior intelligence for the agentic enterprise<b>,</b> announced new Exabeam Agent Behavior Analytics (ABA) capabilities for agents built with Google Cloud’s Agent Development Kit (ADK) and an integration framework with Google Agent Gateway, establishing Exabeam at the forefront of securing enterprises as they adopt agentic workflows. This update extends Exabeam ABA across the Google agent ecosystem, including Gemini Enterprise, custom-built agents, and multi-agent workflows.</p>
<p>As enterprises adopt agent-based architectures to automate workflows and decision making, security teams face limited visibility into how autonomous agents operate, interact, and access data. These challenges are compounded in multi-agent environments where coordinated activity across systems introduces new risks as agents are often treated with the same level of authority as human insiders.</p>
<p>Exabeam ABA addresses these challenges by providing unified visibility, behavior baselining, anomaly detection, and cross-agent correlation to detect and investigate risks across both individual agents and multi-agent workflows.</p>
<p>With support for Google Cloud’s Agent Development Kit, organizations can now secure custom-built agents from development through production. Exabeam ABA provides deep insight into how these agents operate, interact, and evolve over time — ensuring that innovation does not come at the cost of security.</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/information-communications-technology/cybersecurity/wind-river-joins-the-cheri-alliance-and-collaborates-with-innovate-uk-to-accelerate-cybersecurity-innovation/" target="_self" rel="bookmark" data-wpel-link="internal">Wind River Joins the CHERI Alliance and Collaborates with Innovate UK to Accelerate Cybersecurity Innovation</a></strong></h4>
<p>“Agentic AI represents a fundamental shift in how applications are built and operated,” said Steve Wilson, Chief AI and Product Officer at Exabeam. “By extending our Agent Behavior Analytics to include agents developed with Google Cloud’s Agent Development Kit, we are enabling security teams to maintain trust and visibility across the full lifecycle of intelligent agents.”</p>
<p>“As we bring more AI agents into the business, we need a clear understanding of how those agents behave, how they interact with systems and data, and where potential risk can emerge,” said Eric Santa Cruz, Architect, IT Security at Resorts World Las Vegas. “What Exabeam is doing in Agent Behavior Analytics is exactly the kind of innovation we have been looking for. It addresses a rising challenge organizations are facing as AI adoption grows and gives us greater confidence that we can move forward securely while getting more value from AI across our operations.”</p>
<p>Integration with Google’s Agent Gateway expands this coverage to multi-agent environments. <a href="https://www.exabeam.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">Exabeam</a> ABA will ingest and analyze agent-to-agent interactions, map workflow relationships, and identify anomalous patterns across distributed systems. This allows security teams to detect risks that emerge from coordinated or unintended behavior across multiple agents.</p>
<p><strong>Source: <a href="https://www.businesswire.com/news/home/20260422397110/en/Exabeam-Extends-Agent-Behavior-Analytics-to-the-Google-Cloud-Agent-Ecosystem" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">BusinessWire</a></strong></p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/exabeam-extends-agent-behavior-analytics-to-the-google-cloud-agent-ecosystem/" data-wpel-link="internal">Exabeam Extends Agent Behavior Analytics to the Google Cloud Agent Ecosystem</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Chainguard and Cursor Partner to Secure Agentic Coding with Trusted Open Source</title>
		<link>https://itdigest.com/artificial-intelligence/chainguard-and-cursor-partner-to-secure-agentic-coding-with-trusted-open-source/</link>
		
		<dc:creator><![CDATA[Prashant Pawar]]></dc:creator>
		<pubDate>Wed, 22 Apr 2026 12:19:24 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Agentic Development]]></category>
		<category><![CDATA[AI coding agents]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[Chainguard]]></category>
		<category><![CDATA[Cursor]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[Open Source]]></category>
		<category><![CDATA[Secure Agentic Coding]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=79760</guid>

					<description><![CDATA[<p>Chainguard and Cursor have announced a strategic partnership to secure the next generation of AI-driven software development. The collaboration focuses on embedding trusted, secure-by-default open-source components directly into agentic coding workflows, addressing rising concerns around vulnerabilities in AI-generated code. The rise in the use of AI coding agents leads to developers trusting automated tools that [&#8230;]</p>
<p>The post <a href="https://itdigest.com/artificial-intelligence/chainguard-and-cursor-partner-to-secure-agentic-coding-with-trusted-open-source/" data-wpel-link="internal">Chainguard and Cursor Partner to Secure Agentic Coding with Trusted Open Source</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Chainguard and Cursor have announced a strategic partnership to secure the next generation of AI-driven software development. The collaboration focuses on embedding trusted, secure-by-default open-source components directly into agentic coding workflows, addressing rising concerns around vulnerabilities in AI-generated code.</p>
<p>The rise in the use of AI coding agents leads to developers trusting automated tools that pick dependencies, generate code, and push applications. However, since most of the tools access dependencies in open public repositories such as PyPI, npm, and Maven Central that have been frequently targeted in supply chain attacks, the collaboration provides an additional layer of trust to artifacts in AI-powered coding by verifying, hardening, and protecting them against malware.</p>
<p>Using the collaboration, the developers will be able to automatically source dependencies from Chainguard&#8217;s repository that features pre-vetted, verified, and hardened software libraries and container images that are used to write code using the company&#8217;s AI native coding platform, eliminating any risks of compromising security when moving code to production. As such, the collaboration will help developers to write and deploy code in a secure way without having to worry about their safety.</p>
<p>However, the announcement of the collaboration could not have come at a better time since, according to research, about 84% of software developers have adopted the use of AI coding agents. Moreover, the recent spate of supply chain attacks on popular open-source components has shown how much impact such an incident can cause on a global scale.</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/fintech/alkami-to-expand-genai-capabilities-with-the-launch-of-alkami-code-studio/" target="_self" rel="bookmark" data-wpel-link="internal">Alkami to Expand GenAI Capabilities with the Launch of Alkami Code Studio</a></strong></h4>
<h3>Implications for the IT Industry</h3>
<p>This collaboration emphasizes the emerging paradigm in the IT field of developing applications with secure-by-default, native AI environments. As coding agents achieve increasing autonomy, conventional IT approaches to cybersecurity such as code reviews and post-deployment patches become inadequate.</p>
<p>IT executives should recognize this collaboration as a way of highlighting software supply chain security as an integral part of the current development process. Businesses must be able to govern each stage of their development processes, from the generation of code to dependencies.</p>
<p>Moreover, the inclusion of trusted open-source components in the development process signifies the adoption of policy-driven software ecosystems within which security considerations are integrated into the development process rather than introduced subsequently.</p>
<p>Finally, it is worth noting that the current collaboration serves as a demonstration of the increasing necessity for governance and management frameworks for AI technologies.</p>
<h3>Business Impact and Strategic Value</h3>
<p>The collaboration between Chainguard and Cursor provides an excellent opportunity for companies to expand their AI-powered development safely while effectively managing the risks. By automating the identification of secure dependencies, businesses can shorten their development cycles and still maintain security.</p>
<p>Speed and reliability are two of the most important aspects of some industries where the use of this product will be very beneficial. When the speed of development is increased without compromising security, it decreases the risk of breaches that cause huge losses, halting of operations, and damages to the reputation.</p>
<p>Having confidence in the output of AI-generated code increases effectiveness even more. Tech teams can spend their time on coming up with innovations and new features instead of doing the time-consuming work of checking security manually and validating dependencies. As a result, less resources are wasted and the time needed to launch new products and services is shortened.</p>
<p>Besides that, starting from secure configurations by default makes it easier for organizations to comply with regulations and standards, which are continuously tightening especially in the matters of data protection and cybersecurity.</p>
<h3>Securing the Future of Agentic Development</h3>
<p>The partnership between <a href="https://www.chainguard.dev/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">Chainguard</a> and <a href="https://cursor.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">Cursor</a> represents a pivotal moment in the evolution of software development. As AI agents become central to coding workflows, the need for built-in security is becoming non-negotiable.</p>
<p>For the IT industry and businesses alike, this development signals a future where AI-driven innovation and security must evolve together. Organizations that embrace secure, AI-native development models will be better positioned to harness the full potential of agentic coding while safeguarding their systems, data, and customers in an increasingly complex digital landscape.</p>
<p>The post <a href="https://itdigest.com/artificial-intelligence/chainguard-and-cursor-partner-to-secure-agentic-coding-with-trusted-open-source/" data-wpel-link="internal">Chainguard and Cursor Partner to Secure Agentic Coding with Trusted Open Source</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>TekStream Expands Digital Resilience Capabilities with ImagineX Cybersecurity Acquisition</title>
		<link>https://itdigest.com/information-communications-technology/cybersecurity/tekstream-expands-digital-resilience-capabilities-with-imaginex-cybersecurity-acquisition/</link>
		
		<dc:creator><![CDATA[ITDigest Bureau]]></dc:creator>
		<pubDate>Wed, 22 Apr 2026 12:19:08 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Information and Communications Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Acquisition]]></category>
		<category><![CDATA[cyber-threats]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Business]]></category>
		<category><![CDATA[digital resilience]]></category>
		<category><![CDATA[ImagineX]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[Security Operations]]></category>
		<category><![CDATA[TekStream]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=79748</guid>

					<description><![CDATA[<p>TekStream has also revealed that it has acquired the cybersecurity business of ImagineX. This is a strategic step taken by TekStream in an attempt to bolster its digital resilience solutions by enhancing its end-to-end capabilities. It seeks to merge advisory services, governance structures, and security operations in order to cater to the dynamic and continuous [&#8230;]</p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/tekstream-expands-digital-resilience-capabilities-with-imaginex-cybersecurity-acquisition/" data-wpel-link="internal">TekStream Expands Digital Resilience Capabilities with ImagineX Cybersecurity Acquisition</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>TekStream has also revealed that it has acquired the cybersecurity business of ImagineX. This is a strategic step taken by TekStream in an attempt to bolster its digital resilience solutions by enhancing its end-to-end capabilities. It seeks to merge advisory services, governance structures, and security operations in order to cater to the dynamic and continuous nature of cyber threats.</p>
<p>The acquisition means that TekStream will benefit from several services provided by ImagineX. These include cyber strategy and advisory, vCISO services, GRC, CTEM, and IAM. These services will be integrated with TekStream’s MDR services to form an integrated model where decision-making at the board level is merged with security operations. The rationale behind this is based on the fact that cyber threats are continuously evolving, making it difficult for firms to handle strategy, governance, and execution separately using different vendors.</p>
<p>“In an AI-driven threat landscape that never stops evolving, cybersecurity resilience must be treated as a continuous capability — not a one-time initiative,” said Rob Jansen, CEO of TekStream. “That requires more than tools or reports. It requires clear ownership. By combining MDR with embedded strategic governance and executive leadership, we connect boardroom intent directly to operational outcomes — transforming cybersecurity from a reactive cost center into a durable business capability.”</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/information-communications-technology/cybersecurity/n-able-introduces-ai-native-uem-with-mcp-server-and-n-zo-assistant/" target="_self" rel="bookmark" data-wpel-link="internal">N-able Introduces AI-Native UEM with MCP Server and N-zo Assistant</a> </strong></h4>
<p>The integration also brings experienced advisors, established frameworks, and deep industry expertise into TekStream’s ecosystem, enabling organizations to manage risk across infrastructure, applications, identity, and data environments more effectively.</p>
<p>“This acquisition reinforces a core belief we operate by every day: cybersecurity is compromised when strategy and execution are owned by different organizations,” said Taylor Morgan, Chief Solutions Officer of TekStream. “Boards guide strategy and monitor execution quarterly. Attackers move in minutes. Our model closes that gap. Strategy, governance, CTEM, IAM and MDR are not separate motions — they function as one continuously governed system. That&#8217;s how risk is actually reduced, not just reported.”</p>
<p>In addition to this, there is a strategic alliance between <a href="https://www.tekstream.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">TekStream</a> and ImagineX. Although TekStream shall be handling all security and resiliency services for the clients, ImagineX would concentrate on its engineering, data, and AI capabilities. Thus, the client would receive additional value from such an alliance while ensuring clear responsibility and ownership.</p>
<p>This comes against the backdrop of a wider industry trend toward integrated life-cycle security frameworks.</p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/tekstream-expands-digital-resilience-capabilities-with-imaginex-cybersecurity-acquisition/" data-wpel-link="internal">TekStream Expands Digital Resilience Capabilities with ImagineX Cybersecurity Acquisition</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Wind River Joins the CHERI Alliance and Collaborates with Innovate UK to Accelerate Cybersecurity Innovation</title>
		<link>https://itdigest.com/information-communications-technology/cybersecurity/wind-river-joins-the-cheri-alliance-and-collaborates-with-innovate-uk-to-accelerate-cybersecurity-innovation/</link>
		
		<dc:creator><![CDATA[News Desk]]></dc:creator>
		<pubDate>Wed, 22 Apr 2026 12:18:49 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Information and Communications Technology]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[CHERI Alliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Innovation]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[intelligent edge]]></category>
		<category><![CDATA[ITDigest]]></category>
		<category><![CDATA[news]]></category>
		<category><![CDATA[security technology]]></category>
		<category><![CDATA[Wind River]]></category>
		<guid isPermaLink="false">https://itdigest.com/?p=79723</guid>

					<description><![CDATA[<p>Wind River, an Aptiv company and global leader in mission critical software for the intelligent edge, announced that it has joined the CHERI Alliance, a group championing the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology. CHERI architecture is designed to enhance system security through memory protection and access permissions which [&#8230;]</p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/wind-river-joins-the-cheri-alliance-and-collaborates-with-innovate-uk-to-accelerate-cybersecurity-innovation/" data-wpel-link="internal">Wind River Joins the CHERI Alliance and Collaborates with Innovate UK to Accelerate Cybersecurity Innovation</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Wind River, an Aptiv company and global leader in mission critical software for the intelligent edge, announced that it has joined the CHERI Alliance, a group championing the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology.</p>
<p>CHERI architecture is designed to enhance system security through memory protection and access permissions which can combat security issues such as memory corruption and unauthorized code execution. Wind River’s work with the Alliance aims to help the ecosystem develop more secure products and drive cybersecurity innovation by reducing memory vulnerabilities.</p>
<p>“Advances like CHERI mark an important shift toward hardware-enforced security as a foundation for next-generation systems. By addressing memory safety at the architectural level, CHERI has the potential to improve resilience across critical infrastructure and intelligent edge deployments,” said Paul Miller, CTO, Intelligent Systems, Software and Services, Aptiv. “Wind River is excited to collaborate with the CHERI Alliance and contribute our expertise in real-time operating systems and virtualization, leveraging VxWorks and the Helix Virtualization Platform to help operationalize CHERI in production environments.”</p>
<p>“The CHERI Alliance is bringing the ecosystem together to collaborate and make it easier for the industry to design more secure products,” said Mike Eftimakis, founding director of the CHERI Alliance. “We are excited to welcome Wind River to the CHERI Alliance. Their expertise and collaboration with our community will be a significant boost to our mission to accelerate CHERI adoption.”</p>
<h4><strong>Also Read: <a class="p-url" href="https://itdigest.com/information-communications-technology/cybersecurity/everbridge-advances-high-velocity-cem-with-dynamically-adaptive-resilience/" target="_self" rel="bookmark" data-wpel-link="internal">Everbridge Advances High Velocity CEM<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> with Dynamically Adaptive Resilience</a> </strong></h4>
<p>Expanding on its ongoing work to innovate on CHERI, Wind River was recently awarded a contract as part of a strategic effort from Innovate UK and the Department for Science, Innovation and Technology for the adoption and diffusion of CHERI technology. Wind River will be working to port and extend the VxWorks Real-Time Operating System (RTOS) and Wind River Helix Virtualization Platform (Helix Platform) to leverage the CHERI architecture on RISC-V, enhancing system security and reliability for safety-critical and embedded applications. This project marks a significant step forward in developing secure and scalable RTOSes on RISC-V architecture.</p>
<p>“Working with an industry leader like Wind River will help companies accelerate innovation using industry-grade CHERI-enabled software for a new class of secure RISC-V embedded devices,” said Georgios Papadakis, Senior Innovation Lead, Secure and Resilient Growth Directorate, Innovate UK. “Transitioning Wind River platforms to CHERI RISC-V combines the power of a proven RTOS like VxWorks that has extensive safety certifications with the strengthened digital security and resilience of CHERI technology.”</p>
<p><a href="https://www.windriver.com/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">Wind River</a> had previously completed the architecture ports of VxWorks and Helix Platform to support CHERI on the Armv8 based Morello hardware. With Wind River now enabling CHERI on RISC-V, this further reinforces Wind River’s leadership in architectural coverage for a commercial RTOS.</p>
<p>Market-leading VxWorks is the industry’s most trusted and widely deployed RTOS for mission-critical systems that must be safe and secure. Helix Platform is a hypervisor solution that enables engineering teams to consolidate multiple systems onto a single high-performance embedded system, and streamlines safety certification, reduces project risk, and accelerates time-to-market.</p>
<p><strong>Source: <a href="https://www.businesswire.com/news/home/20260421249526/en/Wind-River-Joins-the-CHERI-Alliance-and-Collaborates-with-Innovate-UK-to-Accelerate-Cybersecurity-Innovation" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer sponsored ugc">BusinessWire</a></strong></p>
<p>The post <a href="https://itdigest.com/information-communications-technology/cybersecurity/wind-river-joins-the-cheri-alliance-and-collaborates-with-innovate-uk-to-accelerate-cybersecurity-innovation/" data-wpel-link="internal">Wind River Joins the CHERI Alliance and Collaborates with Innovate UK to Accelerate Cybersecurity Innovation</a> appeared first on <a href="https://itdigest.com" data-wpel-link="internal">ITDigest</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
