Insights
From Data to Intelligence: Why More Signals Don’t Equal Better Security
The misconception: more data intelligence equals better security In cybersecurity, there’s a common assumption: More data = more visibility = better protection But in...
Secure Authentication Starts With Secure Software Development
Source: freepik Authentication failures remain one of the leading causes of data breaches. From credential stuffing to session hijacking, most successful attacks exploit weaknesses...
What is Shift Left Security?
Gartner predicts that by 2028, cloud computing will be a core business necessity, with global spending expected to surpass $1 trillion. As organizations continue...
Breach of Confidence – 27 March 2026
I’ve been watching my phone battery go to 37% lately and it’s giving me anxiety even though I know I can make it through...
RSAC 2026: No easy fixes for expanding AI attack surface, but a coordinated response is emerging
By Byron V. Acohido SAN FRANCISCO — Forty-four thousand cybersecurity practitioners converged on Moscone Center this week with an urgent question: how do you...
How empowered are security teams with Agentic AI?
How Are Non-Human Identities Transforming Cybersecurity? Are your current cybersecurity practices adequately protecting your organization’s Non-Human Identities (NHIs)? Where digital interactions are increasingly automated,...
Trending News
RSAC 2026 wrap-up – Week in security with Tony Anscombe
This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven't caught up with...
A cunning predator: How Silver Fox preys on Japanese firms this tax season
Business Security Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening...
Virtual machines, virtually everywhere – and with real security gaps
Twenty years ago, almost to the day, Amazon Web Services (AWS) launched Simple Storage Service (S3). A few months later, the company’s Elastic Compute Cloud (EC2) service opened for public...
Cloud workload security: Mind the gaps
Business Security As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning Tomáš Foltýn 24 Mar 2026 • ...
Move fast and save things: A quick guide to recovering a hacked account
Cybercriminals go after people’s personal information across every kind of online platform, including WhatsApp, Instagram, LinkedIn, Roblox, YouTube and Spotify, not to mention finance apps....
EDR killers explained: Beyond the drivers
In recent years, EDR killers have become one of the most commonly seen tools in modern ransomware intrusions: an attacker acquires high privileges, deploys such...
