Insights

Kubernetes Strategy: When It’s a Fit and Who Should Run It

Many organizations that use containers now run at least some production workloads on Kubernetes, and it comes up in most infrastructure discussions. But not...

Your extensions leak clues about you, so we made sure Browser Guard doesn’t

Did you know you can be profiled based on the browser extensions you use? Advertisers can detect which extensions are installed and use that...

Silent Network Authentication: The Invisible Layer Replacing SMS OTP in 2026

The user enters their phone number. The app authenticates them in two seconds. No text message arrives. No code needs to be typed. No...

A Guide to Orchestrating End-to-End Investigations with AI

Apr 8, 2026 A Guide to Orchestrating End-to-End Investigations with AI This blog post is the third in a four-part series on Swimlane’s fleet...

The False Sense of Security in “Successful Logins”

Here’s why “valid access” has become one of the most dangerous blind spots in security. For years, security strategies have been built around stopping...

How to prepare for SOC 2 penetration testing

April 8, 2026 Adam King Director For organisations working towards SOC 2, penetration testing is often one of the more visible and scrutinised components...

Trending News

As breakout time accelerates, prevention-first cybersecurity takes center stage

Business Security Threat actors are using AI to supercharge tried-and-tested TTPs. When attacks move this fast, cyber-defenders need to rethink their own strategy. Phil Muncaster...

Digital assets after death: Managing risks to your loved one’s digital estate

Digital Security Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay. Phil Muncaster 01...

This month in security with Tony Anscombe – March 2026 edition

The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience plan 31 Mar...

RSAC 2026 wrap-up – Week in security with Tony Anscombe

This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven't caught up with...

A cunning predator: How Silver Fox preys on Japanese firms this tax season

Business Security Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening...

Virtual machines, virtually everywhere – and with real security gaps

Twenty years ago, almost to the day, Amazon Web Services (AWS) launched Simple Storage Service (S3). A few months later, the company’s Elastic Compute Cloud (EC2) service opened for public...