Insights

From Data to Intelligence: Why More Signals Don’t Equal Better Security

The misconception: more data intelligence equals better security In cybersecurity, there’s a common assumption: More data = more visibility = better protection But in...

Secure Authentication Starts With Secure Software Development

Source: freepik Authentication failures remain one of the leading causes of data breaches. From credential stuffing to session hijacking, most successful attacks exploit weaknesses...

What is Shift Left Security?

Gartner predicts that by 2028, cloud computing will be a core business necessity, with global spending expected to surpass $1 trillion. As organizations continue...

Breach of Confidence – 27 March 2026

I’ve been watching my phone battery go to 37% lately and it’s giving me anxiety even though I know I can make it through...

RSAC 2026: No easy fixes for expanding AI attack surface, but a coordinated response is emerging

By Byron V. Acohido SAN FRANCISCO — Forty-four thousand cybersecurity practitioners converged on Moscone Center this week with an urgent question: how do you...

How empowered are security teams with Agentic AI?

How Are Non-Human Identities Transforming Cybersecurity? Are your current cybersecurity practices adequately protecting your organization’s Non-Human Identities (NHIs)? Where digital interactions are increasingly automated,...

Trending News

RSAC 2026 wrap-up – Week in security with Tony Anscombe

This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven't caught up with...

A cunning predator: How Silver Fox preys on Japanese firms this tax season

Business Security Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening...

Virtual machines, virtually everywhere – and with real security gaps

Twenty years ago, almost to the day, Amazon Web Services (AWS) launched Simple Storage Service (S3). A few months later, the company’s Elastic Compute Cloud (EC2) service opened for public...

Cloud workload security: Mind the gaps

Business Security As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning Tomáš Foltýn 24 Mar 2026  • ...

Move fast and save things: A quick guide to recovering a hacked account

Cybercriminals go after people’s personal information across every kind of online platform, including WhatsApp, Instagram, LinkedIn, Roblox, YouTube and Spotify, not to mention finance apps....

EDR killers explained: Beyond the drivers

In recent years, EDR killers have become one of the most commonly seen tools in modern ransomware intrusions: an attacker acquires high privileges, deploys such...