Insights

Randall Munroe’s XKCD ‘Little Red Dots’

via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security Bloggers Network syndicated blog from...

Why I Cancelled Semrush After 7 Years (And Why GEO Is the Only B2B Growth Strategy That Matters Now)

I cancelled my Semrush subscription last month. After seven years of tracking keyword rankings, monitoring backlinks, and optimizing for Google's algorithm, I pressed the...

CVE-2026-35616: Fortinet FortiClientEMS improper access control vulnerability exploited in the wild

Exploitation has been observed for CVE-2026-35616, a critical improper access control zero-day vulnerability affecting Fortinet FortiClientEMS devices. Key takeaways: CVE-2026-35616, an improper access control...

The Google Workspace Blind Spot Every K-12 IT Team Misses

How DeForest School District Gained Visibility into Google Workspace and Transformed Their Security Workflow with Cloud Monitor When you’re responsible for keeping an entire...

Gartner IAM Summit 2026: Identity Expanded Faster Than Most Programs Did

The keynote set the tone early. Identity is no longer just a control layer for workforce access. It is becoming part of the operating...

The Compliance Cliff: Email Encryption and Data Security Unpacked

It usually starts with a question nobody wants to ask out loud: “What happens when we send something we shouldn’t?” or worse. “What happens...

Trending News

Digital assets after death: Managing risks to your loved one’s digital estate

Digital Security Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay. Phil Muncaster 01...

This month in security with Tony Anscombe – March 2026 edition

The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience plan 31 Mar...

RSAC 2026 wrap-up – Week in security with Tony Anscombe

This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven't caught up with...

A cunning predator: How Silver Fox preys on Japanese firms this tax season

Business Security Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening...

Virtual machines, virtually everywhere – and with real security gaps

Twenty years ago, almost to the day, Amazon Web Services (AWS) launched Simple Storage Service (S3). A few months later, the company’s Elastic Compute Cloud (EC2) service opened for public...

Cloud workload security: Mind the gaps

Business Security As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning Tomáš Foltýn 24 Mar 2026  • ...