Insights

How does Agentic AI drive innovation in cloud security?

How Are Non-Human Identities Transforming Cloud Security? Have you ever considered who—or what—is watching over your digital assets? A novel concept known as Non-Human...

Can I be reassured of data integrity with Agentic AI?

How Can Non-Human Identities Enhance Data Integrity in Agentic AI? Have you ever considered the silent guardians keeping your data safe, especially in a...

When AI Goes Rogue, Science Fiction Meets Reality

Lohrmann on Cybersecurity The new movie Tron: Ares isn’t just sci-fi entertainment — it’s a mirror for today’s AI risks and realities. What happens...

Salesforce: Some Customer Data Accessed via Gainsight Breach

The highly publicized data breaches earlier this fall of Salesforce customers that was linked to Salesloft’s Drift application is coming back to haunt the...

The Security Landscape of Mobile Apps in Africa

CyLab-Africa researchers partner with mobile security provider for summer collaboration experience Researchers from CyLab-Africa and the Upanzi Network recently partnered with the mobile security provider Approov to explore...

MY TAKE: Carol Sturka declares ‘I have agency!’ — Big Tech’s AI models now testing that claim

By Byron V. Acohido It was a tense moment in Episode 4 of Pluribus, the Apple TV series about a world linked by a...

Trending News

The OSINT playbook: Find your weak spots before attackers do

Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots Mario Micucci...

PlushDaemon compromises network devices for adversary-in-the-middle attacks

ESET researchers provide insights into how PlushDaemon performs adversary-in-the-middle attacks using a previously undocumented network implant that we have named EdgeStepper, which redirects all DNS...

What if your romantic AI chatbot can’t keep a secret?

Does your chatbot know too much? Think twice before you tell your AI companion everything. Phil Muncaster 17 Nov 2025  •  , 4 min. read...

How password managers can be hacked – and how to stay safe

Digital Security Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe Phil Muncaster...

Why shadow AI could be your biggest security blind spot

Business Security From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company Phil Muncaster 11 Nov...

In memoriam: David Harley

Former colleagues and friends remember the cybersecurity researcher, author, and mentor whose work bridged the human and technical sides of security 07 Nov 2025  • ...