Insights
What security leaders need to know about zero trust identity management in 2026
The post What security leaders need to know about zero trust identity management in 2026 first appeared on TrustCloud. *** This is a Security...
Don’t confuse asset inventory with exposure management
Asset discovery tells you what IT exists in your environment. Exposure management tells you what will get you breached. If your platform can’t connect...
Startups accuse Microsoft of ‘billing trap’ in Azure AI Foundry after unexpected charges
Microsoft, which offers up to $150,000 in Azure credits to early-stage ventures through the Microsoft for Startups initiative, did not respond to an email seeking...
RSAC 2026 Innovation Sandbox | Fig Security: Guardian of the Reliability of Security Detection Systems
Company Profile Fig Security is a cybersecurity startup founded in 2025. It is headquartered in Israel with business operations also based in the United...
What Are Your DDoS Testing Options in 2026?
No modern business can afford to ignore the threat of DDoS attacks. For many enterprises, reliable online services are critical to operations and reputation—while...
When insider risk is a wellbeing issue, not just a disciplinary one
Written by Katie Barnett, Director of Cyber Security at Toro Solutions Insider risk is still often framed around intent, with the focus placed on...
Trending News
Face value: What it takes to fool facial recognition
ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026...
Cyber fallout from the Iran war: What to have on your radar
The war in Iran was less than 24 hours old when it produced a historic first: the deliberate targeting of commercial data centers. On March...
Sednit reloaded: Back in the trenches
Since April 2024, Sednit’s advanced development team has reemerged with a modern toolkit centered on two paired implants, BeardShell and Covenant, each using a different...
What cybersecurity actually does for your business
Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...
How SMBs use threat research and MDR to build a defensive edge
Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...
Protecting education: How MDR can tip the balance in favor of schools
Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response...
