Insights

Zero Trust Authorization for Multi-Agent Systems: When AI Agents Call Other AI Agents

A big paradigm shift happening in AI security right now: We've made significant progress securing single-agent systems—authentication, authorization, credential lifecycle management. The patterns are...

Loveholidays Protects its APIs & Improves Conversions with Real-Time Bot Defense

Loveholidays is the fastest-growing online travel agency in the UK. Aggressive scraper bots were driving up third-party API calls to the point of sometimes...

Google patches two Chrome zero-days under active attack. Update now

Google has released an out-of-band security update for Chrome desktop that patches two high‑severity zero‑day vulnerabilities. Both bugs can be exploited remotely and require...

Threat Modeling with AI: A Developer-Driven Boon for Enterprise Security 

For companies running a modern, adaptive and defense-centered security program, threat modeling is not a new concept. In fact, it’s one of the core...

Understanding SOC 2 Controls for SaaS Providers

March 13, 2026 Adam King Director For SaaS providers, trust is a core part of the offering. Customers rely on software platforms to process...

Decoding the White House Cyber Strategy: Why Resilience Matters Now

America’s new National Cyber Strategy sends a very clear message that cybersecurity is now about resilience, not just defense. The strategy emphasizes modernizing federal...

Trending News

Cyber fallout from the Iran war: What to have on your radar

The war in Iran was less than 24 hours old when it produced a historic first: the deliberate targeting of commercial data centers. On March...

Sednit reloaded: Back in the trenches

Since April 2024, Sednit’s advanced development team has reemerged with a modern toolkit centered on two paired implants, BeardShell and Covenant, each using a different...

What cybersecurity actually does for your business

Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...

How SMBs use threat research and MDR to build a defensive edge

Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...

Protecting education: How MDR can tip the balance in favor of schools

Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response...

This month in security with Tony Anscombe – February 2026 edition

In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools 28 Feb 2026...