News – March 4, 2026

News for today:

  • Comprehensive visibility and control into AI usage across heterogeneous environments. ArmorCode updated its unified exposure management suite – the ArmorCode Agentic AI Platform – with new AI exposure management capabilities. ArmorCode AI Exposure Management solves [the challenge of shadow and hidden AI usage] by continuously ingesting AI usage and governance signals from across an organization’s security tools and IT systems. It also maintains a comprehensive inventory of enterprise AI activity and converts raw risk detections into governed decisions with built-in accountability. The result is faster and safer AI adoption with scalable and defensible governance. ArmorCode
  • Shared workstation access no longer a problem in healthcare organizations with Netskope and Imprivata. The two companies integrated their solutions so healthcare workers have dedicated / individual access even on shared workstations. The initial … integration balances identity-aware zero trust security for clinical continuity with the speed necessary for modern patient care. With Imprivata’s high-fidelity user identity context, Netskope One enables healthcare organizations to enact adaptive, risk-based policies that can be enforced in real time. This seamless integration ensures that the moment a clinician authenticates to access a workstation, Netskope instantly activates a personalized security profile that follows the clinician accessing data across any device or location. This dynamic approach safeguards Protected Health Information (PHI) across cloud, web, AI, and private applications, providing essential guardrails for clinical resilience while ensuring patient care remains uninterrupted and secure. Netskope
  • Unified retainer model for incident response from LevelBlue. Following its recent acquisitions splurge, LevelBlue has unified how its clients can access a multitude of incident response capabilities. Following its recent acquisitions of Cybereason, Stroz Friedberg, and Trustwave, LevelBlue has integrated their frontline cyber response and intelligence capabilities into a unified operational and commercial framework. The Resilience Retainer reflects this strategic consolidation, combining digital forensics, ransomware response, proactive readiness services, and advanced threat intelligence under one offering. Findings from active cyber investigations enrich cutting-edge threat intelligence from LevelBlue SpiderLabs, so clients benefit from real-time telemetry that informs both preparedness initiatives and active response engagements. LevelBlue
  • Auto-adaptive threat prevention in a SASE platform. Cato Networks added new dynamic threat prevention capabilities to its SASE platform, which can detect the emergence of threats over time and across its sensors, for automated remediation / restriction. Cato Dynamic Prevention closes the gap by identifying and automatically stopping advanced threats that evade point-in-time inspection. Built natively into the Cato SASE Platform, Cato Dynamic Prevention continuously correlates months of security and networking activity in real time across Cato’s full range of inline sensors—such as DLP, IPS, and NGAM—and out-of-band engines to identify behavior-based threats that appear benign in isolation. Once identified, Cato dynamically applies adaptive rules, blocking high-risk activity in real time. Cato Networks
  • Detecting vulnerabilities, blocking malware, and fixing security bugs during the software development lifecycle. Endor Labs made AURI – its AI for secure code offering – available to all developers. Intent is to change the architecture and calculus of software coding, not add another layer / stage gate to the process. That’s why we’re launching AURI alongside a partnership with OpenHands. OpenHands represents the future of agentic software development. You can work locally, run in the CI pipeline, or simply delegate tasks via Slack to agents working in the cloud. AURI integrates with these agents via a plugin that bundles dozens of useful security skills into a full-stack security review spanning code, secrets, dependencies, and container images. Endor Labs

Discover more from Osterman Research

Subscribe now to keep reading and get access to the full archive.

Continue reading