Insights

AI Auditability: Why Leaders Must Prove How AI Makes Decisions

The post AI Auditability: Why Leaders Must Prove How AI Makes Decisions appeared first on Cyber security services provider, data privacy consultant | Secureflo....

Can AI-driven security solutions fit small business budgets

Are Non-Human Identities the Missing Piece in Your Cybersecurity Strategy? What Are Non-Human Identities, and Why Are They Important? Have you ever considered the...

The Chrome Extension Backdoor: How ‘Productivity Tools’ Became Enterprise Attack Vectors

In December 2024, millions of users woke up to find that their "productivity tool" Chrome extensions had transformed overnight into data-stealing malware. Not through...

USENIX Security ’25 (Enigma Track) – Please (Don’t) Stop The Music: Adversarial Red-Teaming Of AI Music Generation Models

Author, Creator & Presenter: Jannis Kirschner, Niantic Inc. Our thanks to USENIX Security ’25 (Enigma Track) (USENIX ’25 for publishing their Creators, Authors and...

ClickFix attackers using new tactic to evade detection, says Microsoft

“And all Windows computers should already be restricted so that random, unsigned (not signed by the organization), PowerShell commands should not be allowed. Every organization and...

5 Actions Critical for Cybersecurity Leadership During International Conflicts

  The recent military attacks involving Iran in the Middle East are a stark reminder that cybersecurity leadership must continually incorporate geopolitical risk into...

Trending News

What cybersecurity actually does for your business

Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...

How SMBs use threat research and MDR to build a defensive edge

Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...

Protecting education: How MDR can tip the balance in favor of schools

Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response...

This month in security with Tony Anscombe – February 2026 edition

In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools 28 Feb 2026...

Mobile app permissions (still) matter more than you may think

Mobile Security Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious...

Faking it on the phone: How to tell if a voice call is AI or not

Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers. Phil Muncaster...