Insights

USENIX Security ’25 (Enigma Track) – Security Theater Is Canceled: Time For A Real Show

Author, Creator & Presenter: Lea Kissner, LinkedIn Our thanks to USENIX Security ’25 (Enigma Track) (USENIX ’25 for publishing their Creators, Authors and Presenter’s...

OMB Rolled Back the Rules. Security Did Not Get Easier

The U.S. Office of Management and Budget (OMB)’s decision to rescind M-22-18 and M-23-16 and replace them with M-26-05 has been framed as a...

Inference protection for LLMs: Keeping sensitive data out of AI workflows

As organizations accelerate their adoption of large language models, data privacy and security concerns have emerged as one of the biggest barriers to enterprise...

AI Just Made Executives the Easiest Targets on the Internet

The next time someone targets your CEO, they most likely won’t be a nation-state operative or a professional cyberattacker. They may be a disgruntled...

LeakyLooker: Hacking Google Cloud’s Data via Dangerous Looker Studio Vulnerabilities

Tenable Research revealed “LeakyLooker,” a set of nine novel cross-tenant vulnerabilities in Google Looker Studio. These flaws could have let attackers exfiltrate or modify...

How to Download and Install SafeNet Authentication Client for Sectigo Code Signing Certificates?

Home » How to Download and Install SafeNet Authentication Client for Sectigo Code Signing Certificates? When using a hardware token-based certificate, it is important...

Trending News

What cybersecurity actually does for your business

Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...

How SMBs use threat research and MDR to build a defensive edge

Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...

Protecting education: How MDR can tip the balance in favor of schools

Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response...

This month in security with Tony Anscombe – February 2026 edition

In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools 28 Feb 2026...

Mobile app permissions (still) matter more than you may think

Mobile Security Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious...

Faking it on the phone: How to tell if a voice call is AI or not

Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers. Phil Muncaster...