Insights
RSAC Innovation Sandbox | Token Security: Advocate of the Machine-First Identity Security Concept
Company Introduction Token Security (see Figure 1) is a cybersecurity company focusing on the security of Agentic AI and Non-Human Identities (NHI). It is committed...
RSAC Innovation Sandbox | Token Security: Advocate of the Machine-First Identity Security Concept
Company Introduction Token Security (see Figure 1) is a cybersecurity company focusing on the security of Agentic AI and Non-Human Identities (NHI). It is committed...
Cryptographic Agility in Model Context Protocol Implementations
The big shift from dashboards to action Ever feel like you're drowning in dashboards? We've all been there—staring at a screen full of red...
Building Trust in AI SOC Analyst Solutions: A UK and EU CISO Perspective
By Brett Candon, VP International at Dropzone AI Trust has always been critical in security operations, but in the UK and Europe it carries...
How smart can Agentic AI become in protecting assets
Can Smart Agentic AI Revolutionize Asset Protection? How can organizations harness the power of Agentic AI to safeguard their most valuable assets? With industries...
Are scalable cloud-native security solutions the future
How Can Non-Human Identities Revolutionize Cloud Security? The question of how to effectively manage Non-Human Identities (NHIs) is gaining urgency where industries harness scalable,...
Trending News
Cyber fallout from the Iran war: What to have on your radar
The war in Iran was less than 24 hours old when it produced a historic first: the deliberate targeting of commercial data centers. On March...
Sednit reloaded: Back in the trenches
Since April 2024, Sednit’s advanced development team has reemerged with a modern toolkit centered on two paired implants, BeardShell and Covenant, each using a different...
What cybersecurity actually does for your business
Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...
How SMBs use threat research and MDR to build a defensive edge
Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...
Protecting education: How MDR can tip the balance in favor of schools
Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response...
This month in security with Tony Anscombe – February 2026 edition
In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools 28 Feb 2026...
