Insights

Understanding the Security of Passkeys

The Shocking Truth: 73% of B2B Content is a Backlink Black Hole Okay, so here's a fun fact to kick things off: a massive...

How certain can I be of the security in NHIs?

Are Machine Identities as Secure as We Think? Where digital rapidly expanding across various sectors—from financial services to healthcare—organizations are compelled to assess the...

What makes NHIs a powerful tool in cybersecurity?

Why Are Non-Human Identities Transformative in Cybersecurity? Have you ever considered how the management of machine identities could revolutionize cybersecurity across various sectors? Non-Human...

Radware Adds Firewall for LLMs to Security Portfolio

Radware has developed a firewall for large language models (LLMs) that ensures governance and security policies are enforced in real time.Provided as an add-on...

Life in the Swimlane with Pauline Bacot, Senior Product Marketing Manager

Nov 25, 2025 Welcome to the “Life in the Swimlane” blog series. Here we will feature interviews with Swimlaners to learn more about their...

Don’t Use a Ruler to Measure Wind Speed: Establishing a Standard for Competitive Solutions Testing

Competitive testing is a business-critical function for financial institutions seeking the ideal solutions provider to help optimize their risk management strategies. Don’t get seduced...

Trending News

MDR is the answer – now, what’s the question?

Business Security Why your business needs the best-of-breed combination of technology and human expertise Steven Connolly 24 Nov 2025  •  , 4 min. read When...

The OSINT playbook: Find your weak spots before attackers do

Here’s how open-source intelligence helps trace your digital footprint and uncover your weak points, plus a few essential tools to connect the dots Mario Micucci...

PlushDaemon compromises network devices for adversary-in-the-middle attacks

ESET researchers provide insights into how PlushDaemon performs adversary-in-the-middle attacks using a previously undocumented network implant that we have named EdgeStepper, which redirects all DNS...

What if your romantic AI chatbot can’t keep a secret?

Does your chatbot know too much? Think twice before you tell your AI companion everything. Phil Muncaster 17 Nov 2025  •  , 4 min. read...

How password managers can be hacked – and how to stay safe

Digital Security Look no further to learn how cybercriminals could try to crack your vault and how you can keep your logins safe Phil Muncaster...

Why shadow AI could be your biggest security blind spot

Business Security From unintentional data leakage to buggy code, here’s why you should care about unsanctioned AI use in your company Phil Muncaster 11 Nov...