Insights

Web Single Sign-On: Understanding WS-Federation

It’s 2026. If you listen to the keynote speakers at identity conferences, the world is a utopia of Passkeys, Verifiable Credentials, and OIDC running...

From Michigan to Silicon Valley: A Conversation With Mohamad Yassine

Lohrmann on Cybersecurity Lessons on humility, careers, the automotive sector, “cowboy coding” and disrupting with AI from a lifelong innovator. March 01, 2026 •  Dan...

How can you be reassured about your AI’s security integrity

Is Your AI Security Integrity Robust Enough? Where artificial intelligence is increasingly utilized across diverse sectors, the question of AI security integrity often comes...

Is your AI security solution scalable for future challenges

Are Non-Human Identities the Key to Scalable AI Security? How can organizations ensure their AI security solution stays scalable in evolving digital threats? The...

MY TAKE: The Pentagon punished Anthropic for red lines it accepted from OpenAI hours later

By Byron V. Acohido KINGSTON, Wash. — On Friday afternoon, President Trump ordered every federal agency to stop using Anthropic’s AI technology. Defense Secretary...

Iran Has One Card Left—It’s Pointed at Your Network

In light of today’s attack by the U.S. and Israel on Iran, it is prudent to ask: What can Iran do? Strip away everything...

Trending News

This month in security with Tony Anscombe – February 2026 edition

In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools 28 Feb 2026...

Mobile app permissions (still) matter more than you may think

Mobile Security Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious...

Faking it on the phone: How to tell if a voice call is AI or not

Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers. Phil Muncaster...

PromptSpy ushers in the era of Android threats using GenAI

ESET researchers uncovered the first known case of Android malware abusing generative AI for context-aware user interface manipulation. While machine learning has been used to...

Is Poshmark safe? How to buy and sell without getting scammed

Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can...

Is it OK to let your children post selfies online?

Kids Online When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech....