Insights
FIRESIDE CHAT: In the AI age, your MFA, authentication apps can be compromised in minutes
By Byron V. Acohido The authentication layer that corporate America spent a decade building is now a liability. Listen to the podcast:The day MFA...
What Is Physical AI, and What Does It Mean for Government?
Lohrmann on Cybersecurity From Davos insights to state readiness, let‘s explore how robotics and sensors are moving artificial intelligence into the physical world. March...
RSAC 2026 Innovation Sandbox | ZeroPath: From Alarm Accumulation to Executable Fixes
Company Profile ZeroPath is an AI-native application security startup founded in 2024, and its core products also use the eponymous brand ZeroPath. The company...
How relieved are you with your secrets vaulting strategy
Are You Confident in Your Secrets Vaulting Strategy? The management of machine identities—what the industry terms Non-Human Identities (NHIs)—has become a linchpin in safeguarding...
Does your NHI system deliver essential value
Is Your Organization’s Non-Human Identity Strategy Robust Enough? What if the backbone of your organization’s cybersecurity strategy is more susceptible to breaches than you...
Real Attack Alert Analysis: From Hidden Indicators to Actionable Threat Intelligence
Executive Overview Cyber threats are evolving rapidly, becoming more stealthy, automated, and difficult to detect using traditional security approaches. Attackers increasingly rely on legitimate...
Trending News
Move fast and save things: A quick guide to recovering a hacked account
Cybercriminals go after people’s personal information across every kind of online platform, including WhatsApp, Instagram, LinkedIn, Roblox, YouTube and Spotify, not to mention finance apps....
EDR killers explained: Beyond the drivers
In recent years, EDR killers have become one of the most commonly seen tools in modern ransomware intrusions: an attacker acquires high privileges, deploys such...
Face value: What it takes to fool facial recognition
ESET’s Jake Moore used smart glasses, deepfakes and face swaps to ‘hack’ widely-used facial recognition systems – and he'll demo it all at RSAC 2026...
Cyber fallout from the Iran war: What to have on your radar
The war in Iran was less than 24 hours old when it produced a historic first: the deliberate targeting of commercial data centers. On March...
Sednit reloaded: Back in the trenches
Since April 2024, Sednit’s advanced development team has reemerged with a modern toolkit centered on two paired implants, BeardShell and Covenant, each using a different...
What cybersecurity actually does for your business
Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...
