Insights

Passkeys Hit Critical Mass: Microsoft Auto-Enables for Millions, 87% of Companies Deploy as Passwords Near End-of-Life

Breaking: Microsoft begins auto-enabling passkey profiles across all Microsoft Entra ID tenants this week, forcing the largest enterprise migration to passwordless authentication in history....

New macOS security feature will alert users about possible ClickFix attacks

Rumor has it that Apple deployed a new security feature in the fight against ClickFix. The new feature will be available for macOS Tahoe...

vDefend’s Built-in Advantage: Enable Closed-Loop Lateral Security for Zero-Trust Private Cloud

Cybersecurity strategy now shapes how enterprises design cloud platforms, application environments, and core infrastructure. The financial stakes are significant. The next step is architectural:...

RSAC 2026 Recap: From AI Hype to Real SaaS Security Outcomes

It felt as though every single conversation, booth, and presentation at RSAC 2026 mentioned AI. But beyond the sheer volume of messaging around this...

FIRESIDE CHAT: AI gives rise to a semantic attack surface, forcing a new class of network defense

By Byron V. Acohido SAN FRANCISCO — Enterprises rushing to deploy AI in their operations are opening a security exposure most of their existing...

New CCPA Rules Turn Your Privacy Policy into a Liability

California’s revised CCPA rules took effect on January 1, 2026, and they expose a gap that most compliance teams have been ignoring. After you’ve...

Trending News

RSAC 2026 wrap-up – Week in security with Tony Anscombe

This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven't caught up with...

A cunning predator: How Silver Fox preys on Japanese firms this tax season

Business Security Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening...

Virtual machines, virtually everywhere – and with real security gaps

Twenty years ago, almost to the day, Amazon Web Services (AWS) launched Simple Storage Service (S3). A few months later, the company’s Elastic Compute Cloud (EC2) service opened for public...

Cloud workload security: Mind the gaps

Business Security As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning Tomáš Foltýn 24 Mar 2026  • ...

Move fast and save things: A quick guide to recovering a hacked account

Cybercriminals go after people’s personal information across every kind of online platform, including WhatsApp, Instagram, LinkedIn, Roblox, YouTube and Spotify, not to mention finance apps....

EDR killers explained: Beyond the drivers

In recent years, EDR killers have become one of the most commonly seen tools in modern ransomware intrusions: an attacker acquires high privileges, deploys such...