January 2026

Software Component Analysis with AI

Last year, we introduced Software Component Analysis (SCA) as a core capability in our Application Security platform. The goal was simple but critical: extend vulnerability detection beyond first-party code and into the vast ecosystem of third-party and open-source dependencies that modern software is built on. In today’s cloud-native and AI-driven development environments, applications are rarely […]

Software Component Analysis with AI Read More »

Multi-Cloud Security in the Age of AI

As organizations race to adopt AI, modern cloud environments are becoming more complex, distributed, and dynamic than ever before. AI workloads demand elastic infrastructure, access to massive datasets, accelerated compute, and deep integration across cloud services. At the same time, this expansion dramatically increases the attack surface. Security teams are no longer protecting a single

Multi-Cloud Security in the Age of AI Read More »

Runtime Application Security with AI

AI-driven applications are reshaping how software is built, deployed, and operated. Models are trained continuously, inference services scale elastically, and data flows across clouds and clusters at unprecedented speed. In this environment, traditional security controls focused on static configurations and perimeter defenses are no longer sufficient. Modern security must assume that applications are always running,

Runtime Application Security with AI Read More »

Agentic Memory, Personalization, Retention in Cortex

✨ Make it Yours! ✨ We’re adding personalization, memory features, additional privacy and retention to Cortex 2.2. From initial release to memory, Cortex received Personalization feature within 162 days 🚀 fastest of all Coding Agents.  On the research front, we thought deeply about improving personalization using LLMs. We came up with a new initiative to

Agentic Memory, Personalization, Retention in Cortex Read More »

Prioritizing Risk Assessment with Security Scores

Exploit Prediction Scoring System (EPSS) and Common Vulnerability Scoring System (CVSS) are two widely used scoring systems in cybersecurity, each answering a different question about vulnerabilities. EPSS tells you how likely a vulnerability is to be exploited, while CVSS tells you how bad a vulnerability is. Used together, they provide a more complete picture for

Prioritizing Risk Assessment with Security Scores Read More »

Enhancing Customer Privacy with Federated Learning

In the rapidly evolving landscape of enterprise AI, data privacy remains the single biggest barrier to entry. Organizations in finance, healthcare, and software development want the productivity gains of AI, like automated fraud detection, predictive maintenance, and intelligent code assistants, but they cannot risk exposing their intellectual property or violating data residency regulations by pooling

Enhancing Customer Privacy with Federated Learning Read More »

MongoDB Sharding Architecture, Design, Quick Guide

When a database needs to handle more data, more queries, or higher throughput, there are two fundamentally different approaches to scaling: Vertical Scaling and Horizontal Scaling. Vertical scaling means increasing the capacity of a single MongoDB server instance by adding more powerful hardware resources—more CPU cores, more RAM, faster disks, or larger storage. Horizontal scaling

MongoDB Sharding Architecture, Design, Quick Guide Read More »

Scroll to Top