Insights

How Piggybacking Attacks Threaten Organizational Security?

Organizations invest heavily in advanced cybersecurity technologies such as endpoint detection, identity access management, zero trust architecture, and continuous monitoring. However, a significant number...

Anthropic’s US gov’t lawsuit says federal action “unprecedented and unlawful”

“As the proceedings drag on, as they inevitably will, time becomes an asset for Anthropic rather than a liability. In geopolitics, the clock beats the...

Anomalous Prompt Injection Detection in Quantum-Secured AI Pipelines

The basics of identity and access management Ever felt like you're drowning in a sea of passwords just to check your email and then...

Escape raises $18M Series A to replace legacy scanners with AI agent-driven discovery, pentesting, and remediation

Attackers move in hours. Most security teams are still running weekly scans. Today we are proud to announce our $18 million Series A funding...

My Really Fun RSA 2026 Presentations!

This blog is perhaps a little bit more like an ad, so if you don’t want to check the ads, consider not reading it. a...

Are scalable secrets management systems more effective

Are Your Machine Identities Secure? Have you ever wondered about the invisible workforce within your systems? These are not your typical employees but rather...

Trending News

What cybersecurity actually does for your business

Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...

How SMBs use threat research and MDR to build a defensive edge

Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...

Protecting education: How MDR can tip the balance in favor of schools

Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response...

This month in security with Tony Anscombe – February 2026 edition

In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools 28 Feb 2026...

Mobile app permissions (still) matter more than you may think

Mobile Security Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious...

Faking it on the phone: How to tell if a voice call is AI or not

Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers. Phil Muncaster...