Insights

Will 2026 See a ‘ChatGPT Moment’ for Microchip Implants?

Lohrmann on Cybersecurity As Hollywood imagines our future, are brain and human microchip implants nearing a “ChatGPT moment” in 2026? Medical progress collides with privacy...

How adaptable is AI in detecting non-human identity breaches

How Crucial Is AI Adaptability in Detecting Non-Human Identity Breaches? Have you ever questioned the true scale and importance of AI adaptability in cybersecurity, specifically...

How does AI support dynamic secrets management

The Role of AI in Enhancing Dynamic Secrets Management Have you ever wondered how artificial intelligence is transforming cybersecurity, particularly in the management of Non-Human...

Can we be certain AI keeps cloud data secure

What Are Non-Human Identities, and Why Are They Crucial for Cloud Security? One might ask, what role do non-human identities (NHIs) play in safeguarding cloud...

Is your data truly secure with free AI tools

How Can Businesses Ensure the Security of Non-Human Identities? When was the last time your company evaluated the security of its machine identities? With the...

Sonatype Named DevOps Dozen Winner for Best DevSecOps Solution

The DevOps landscape is changing faster than ever. As organizations race to deliver software at speed, they’re also inheriting a new class of risk —...

Trending News

Why LinkedIn is a hunting ground for threat actors – and how to protect yourself

Social Media The business social networking site is a vast, publicly accessible database of corporate information. Don’t believe everyone on the site is who they...

Is it time for internet services to adopt identity verification?

Social Media Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters. Tony Anscombe 14 Jan 2026...

Your personal information is on the dark web. What happens next?

If your data is on the dark web, it’s probably only a matter of time before it’s abused for fraud or account hijacking. Here’s what...

Credential stuffing: What it is and how to protect yourself

Digital Security Reusing passwords may feel like a harmless shortcut – until a single breach opens the door to multiple accounts Christian Ali Bravo 08...

This month in security with Tony Anscombe – December 2025 edition

As 2025 draws to a close, Tony looks back at the cybersecurity stories that stood out both in December and across the whole of this...

A brush with online fraud: What are brushing scams and how do I stay safe?

Have you ever received a package you never ordered? It could be a warning sign that your data has been compromised, with more fraud to...