Insights
At RSAC 2026, AI Redefines the Future of Penetration Testing
Penetration testing is undergoing a substantial shift as AI reshapes both attack and defense strategies. At RSA Conference 2026, multiple vendors pointed to the...
Open-Source FIM: Freely Available. But What Makes Them Expensive?
In a previous article, we explained why it is worth licensing File Integrity Monitoring (FIM) rather than using open-source alternatives. The decision is not...
Apple expands “DarkSword” patches to iOS 18.7.7
Apple widened its latest iOS 18 security update to cover far more iPhones and iPads, specifically to stop real‑world DarkSword attacks that can compromise...
How Sasol Reduced Java Costs by 92% While Strengthening Security and Compliance
For global enterprises, Java is both a critical asset and an increasingly complex liability because of Oracle’s license model, which is decoupled from actual usage, and audit requirements, which can tie...
IMO Health: 5 Reasons security culture starts with trust
The post IMO Health: 5 Reasons security culture starts with trust first appeared on TrustCloud. *** This is a Security Bloggers Network syndicated blog...
Shut the Front Door on Email Attacks: How to Scale Security Services Without Increasing Workload
Email remains the primary entry point for cyberattacks, driven largely by phishing and account compromise. For attackers, it is often the simplest and most...
Trending News
Digital assets after death: Managing risks to your loved one’s digital estate
Digital Security Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay. Phil Muncaster 01...
This month in security with Tony Anscombe – March 2026 edition
The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience plan 31 Mar...
RSAC 2026 wrap-up – Week in security with Tony Anscombe
This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven't caught up with...
A cunning predator: How Silver Fox preys on Japanese firms this tax season
Business Security Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening...
Virtual machines, virtually everywhere – and with real security gaps
Twenty years ago, almost to the day, Amazon Web Services (AWS) launched Simple Storage Service (S3). A few months later, the company’s Elastic Compute Cloud (EC2) service opened for public...
Cloud workload security: Mind the gaps
Business Security As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning Tomáš Foltýn 24 Mar 2026 • ...
