Insights

NHI Governance Is the Outcome. GitGuardian Is How You Get There

There is a category mistake that happens all the time in the non-human identity (NHI) market. People talk about governance as if it were...

Board-Ready Security Metrics That Actually Matter

TL;DR Board-ready security metrics translate technical capabilities into financial risk and business outcomes. Boards need visibility across three dimensions: risk exposure, incident response capability,...

AutoSecT Mobile: Automating Android and iOS Security Testing

Your banking app knows your face. It reads your fingerprint. It trusts that the person holding the phone is really you. But what if...

The Future of Cyber Warfare and its Impact on Global Business Stability 

In an environment where digital systems play an essential role in everything from supply chain management to national defense strategies, cyber warfare has emerged as the...

HIPAA – I Do Not Think That Word Means What You Say It Means

Whenever someone tells you they are required to do something under HIPAA, they are usually wrong. And whenever they tell you they are not...

Breach of Confidence: 3 April 2026

I once tried to assemble IKEA furniture this week without looking at the instructions. Got halfway through before realising I’d built something structurally sound...

Trending News

Digital assets after death: Managing risks to your loved one’s digital estate

Digital Security Fraudsters often target the accounts of the deceased or their grieving relatives. Here’s how to keep the scammers at bay. Phil Muncaster 01...

This month in security with Tony Anscombe – March 2026 edition

The past four weeks have seen a slew of new cybersecurity wake-up calls that showed why every organization needs a well-thought-out cyber-resilience plan 31 Mar...

RSAC 2026 wrap-up – Week in security with Tony Anscombe

This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven't caught up with...

A cunning predator: How Silver Fox preys on Japanese firms this tax season

Business Security Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening...

Virtual machines, virtually everywhere – and with real security gaps

Twenty years ago, almost to the day, Amazon Web Services (AWS) launched Simple Storage Service (S3). A few months later, the company’s Elastic Compute Cloud (EC2) service opened for public...

Cloud workload security: Mind the gaps

Business Security As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning Tomáš Foltýn 24 Mar 2026  • ...