Insights

Zero Tolerance for Malicious Intrusions—NSFOCUS’s Full-Chain WEB Security Protection System

As regional military conflicts escalate, cyberspace has become a critical battleground, with core WEB application systems frequently targeted by adversaries. Attackers tamper with application...

​​How Chinese Hackers Reached America’s Surveillance Infrastructure

Chinese government-linked hackers have breached a network used by the Federal Bureau of Investigation to manage court-authorized surveillance operations. The intrusion, first detected on...

Granular Policy Enforcement in Quantum Secure Discovery Services

The Evolution of sso in the Age of ai Remember when we used to have those sticky notes on our monitors with "P@ssword123" scribbled...

How AI Assistants are Moving the Security Goalposts

AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can automate virtually any task —...

Ring doorbells: Won’t you see my neighbor? (Lock and Code S07E05)

This week on the Lock and Code podcast… On February 8, during the Super Bowl in the United States, countless owners of one of...

Securing Critical Infrastructure in a Time of War

Lohrmann on Cybersecurity A deep dive into Iranian cyber warfare and actionable defenses for network operators. March 08, 2026 •  Dan Lohrmann Adobe Stock/kinomaster As...

Trending News

What cybersecurity actually does for your business

Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...

How SMBs use threat research and MDR to build a defensive edge

Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...

Protecting education: How MDR can tip the balance in favor of schools

Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response...

This month in security with Tony Anscombe – February 2026 edition

In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools 28 Feb 2026...

Mobile app permissions (still) matter more than you may think

Mobile Security Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious...

Faking it on the phone: How to tell if a voice call is AI or not

Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers. Phil Muncaster...