Insights

What security leaders need to know about zero trust identity management in 2026

The post What security leaders need to know about zero trust identity management in 2026 first appeared on TrustCloud. *** This is a Security...

Don’t confuse asset inventory with exposure management

Asset discovery tells you what IT exists in your environment. Exposure management tells you what will get you breached. If your platform can’t connect...

Startups accuse Microsoft of ‘billing trap’ in Azure AI Foundry after unexpected charges

Microsoft, which offers up to $150,000 in Azure credits to early-stage ventures through the Microsoft for Startups initiative, did not respond to an email seeking...

RSAC 2026 Innovation Sandbox | Fig Security: Guardian of the Reliability of Security Detection Systems

Company Profile Fig Security is a cybersecurity startup founded in 2025. It is headquartered in Israel with business operations also based in the United...

What Are Your DDoS Testing Options in 2026?

No modern business can afford to ignore the threat of DDoS attacks. For many enterprises, reliable online services are critical to operations and reputation—while...

When insider risk is a wellbeing issue, not just a disciplinary one

Written by Katie Barnett, Director of Cyber Security at Toro Solutions Insider risk is still often framed around intent, with the focus placed on...

Trending News

Face value: What it takes to fool facial recognition

ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026...

Cyber fallout from the Iran war: What to have on your radar

The war in Iran was less than 24 hours old when it produced a historic first: the deliberate targeting of commercial data centers. On March...

Sednit reloaded: Back in the trenches

Since April 2024, Sednit’s advanced development team has reemerged with a modern toolkit centered on two paired implants, BeardShell and Covenant, each using a different...

What cybersecurity actually does for your business

Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...

How SMBs use threat research and MDR to build a defensive edge

Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...

Protecting education: How MDR can tip the balance in favor of schools

Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response...