Insights

Anomaly Detection in Post-Quantum Encrypted MCP Metadata Streams

The Quantum Blind Spot in AI Metadata Orchestration Ever feel like we’re finally getting the hang of ai orchestration, only to realize the locks...

RFC 4058 – Authentication Protocol Overview

Introduction to RFC 4058 and key management Ever tried building a custom auth flow and realized key management is a total nightmare? RFC 4058...

How do Agentic AI systems ensure robust cloud security?

How Can Non-Human Identities Transform Cloud Security? Is your organization leveraging the full potential of Non-Human Identities (NHIs) to secure your cloud infrastructure? While...

Upgraded Custom ASPM Dashboards: Build Security Views That Match How Your Teams Work

Security teams don’t all work the same way. A CISO needs executive visibility into risk trends. AppSec engineers need deep technical details on vulnerabilities....

The Agentic Virus: How AI Agents Become Self-Spreading Malware

In my previous post, I walked through how disconnected MCP servers and AI agents create a growing blind spot in enterprise identity. The problem:...

MSP Strategic Defense: Where Prevention Meets Compliance

Imagine a modern office building. Not everyone who works there can go everywhere. Employees can access the building entrance, their own floor, and the...

Trending News

Taxing times: Top IRS scams to look out for in 2026

It’s time to file your tax return. And cybercriminals are lurking to make an already stressful period even more edgy. Phil Muncaster 10 Feb 2026...

OfferUp scammers are out in force: Here’s what you should know

The mobile marketplace app has a growing number of users, but not all of them are genuine. Watch out for these common scams. Phil Muncaster...

A slippery slope: Beware of Winter Olympics scams and other cyberthreats

Digital Security It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these...

A slippery slope: Beware of Winter Olympics scams and other cyberthreats

Digital Security It’s snow joke – sporting events are a big draw for cybercriminals. Make sure you’re not on the losing side by following these...

This month in security with Tony Anscombe – January 2026 edition

The year got off to a busy start, with January offering an early snapshot of the challenges that (not just) cybersecurity teams are likely to...

DynoWiper update: Technical analysis and attribution

In this blog post, we provide more technical details related to our previous DynoWiper publication. Key points of the report: ESET researchers identified new data-wiping...