Insights
2025 Threat Landscape in Review: Lessons for Businesses Moving Into 2026
2025 Threat Landscape in Review: Lessons for Businesses Moving Into 2026andrew.gertz@t…Thu, 01/15/2026 – 16:48 2025 was a year that tested how businesses think about...
AI, agents, and the trust gap
As we speak, I’m remodeling my kitchen and relied heavily on ChatGPT to research sinks, compare reviews, and determine whether I can do all...
The Next Security Battleground: Agentic Identity
Shahar Tal, CEO and co-founder of Cyata, discusses how the company is building the control plane for agentic identity. With deep roots in Israel’s...
We’re Moving Too Fast: Why AI’s Race to Market Is a Security Disaster
The recently disclosed ServiceNow vulnerability should terrify every CISO in America. CVE-2025-12420, dubbed “BodySnatcher,” represents everything wrong with how we’re deploying AI in the...
Report: Massive Amounts of Sensitive Data Being Shared with GenAI Tools
A report published today by Harmonic Security suggests that the amount of data being shared with generative artificial intelligence (AI) tools is exponentially increasing...
Apple’s Creator Studio: Life after the App Store?
Acceptance, but not at any price Combine the trends and it’s evident that not only are people more prepared to subscribe to apps than in...
Trending News
Is it time for internet services to adopt identity verification?
Social Media Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters. Tony Anscombe 14 Jan 2026...
Your personal information is on the dark web. What happens next?
If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what...
Credential stuffing: What it is and how to protect yourself
Digital Security Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts Christian Ali Bravo 08...
This month in security with Tony Anscombe – December 2025 edition
As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this...
A brush with online fraud: What are brushing scams and how do I stay safe?
Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to...
Revisiting CVE-2025-50165: A critical flaw in Windows Imaging Component
ESET researchers examined CVE‑2025‑50165, a serious Windows vulnerability described to grant remote code execution by merely opening a specially crafted JPG file – one of...
