Insights
[un]prompted 2026 – Guardrails Beyond Vibes
Author, Creator & Presenter: Jeffrey Zhang, Security Engineer, Stripe & Siddh Shah, Software Engineer, Stripe Our thanks to prompted for publishing their Creators, Authors...
Post-Quantum Cryptography: Moving From Awareness to Execution
Lohrmann on Cybersecurity Google recently released important research that moves Q-Day — the day quantum computers will be able to “break the Internet” —...
Why DDoS Mitigation Fails: 5 Gaps That Testing Reveals
Companies invest heavily in DDoS mitigation, yet outages still happen—often at the worst possible moment. The problem is rarely the protection technology, but the...
How scalable is Agentic AI for growing businesses
Is Your Organization Prepared to Manage Non-Human Identities Effectively? The rapid surge in digital transformation has fundamentally shifted how organizations across industries operate. When...
Sample Malware Phone Back C&C (Command and Control) MD5s From Domains Belonging to XSS Forum Users – A Compilation
Dear blog readers, In my most recent analysis I decided to takea deeper look inside some of the domains which belong to members of...
Using AI at Work? Here’s How to Avoid Accidentally Leaking Company Data
The rapid adoption of Generative AI Applications across enterprises has transformed productivity, automation, and decision-making. AI tools now power daily workflows by drafting emails,...
Trending News
Digital assets after death: Managing risks to your loved one’s digital estate
Digital Security Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay. Phil Muncaster 01...
This month in security with Tony Anscombe – March 2026 edition
The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience plan 31 Mar...
RSAC 2026 wrap-up – Week in security with Tony Anscombe
This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven't caught up with...
A cunning predator: How Silver Fox preys on Japanese firms this tax season
Business Security Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening...
Virtual machines, virtually everywhere – and with real security gaps
Twenty years ago, almost to the day, Amazon Web Services (AWS) launched Simple Storage Service (S3). A few months later, the company’s Elastic Compute Cloud (EC2) service opened for public...
Cloud workload security: Mind the gaps
Business Security As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning Tomáš Foltýn 24 Mar 2026 • ...
