Insights
What is the Salesforce GraphQL Exploit and What You Should Do
Learn how misconfigured Salesforce Experience Cloud guest user settings is being exploited, and how AppOmni detects against these threats You may have seen Salesforce’s...
AEO vs GEO vs AIO: What These Terms Actually Mean and Why Your Business Needs to Care
If you have spent any time in marketing circles over the past year, you have probably noticed three acronyms showing up with increasing frequency:...
Identity Crisis: Global Firms Face Mounting Risks Amid AI Surge and Lack of Recovery Testing
Organizations may be increasingly adopting Identity Threat Detection and Response (ITDR) practices, but a critical gap in disaster recovery readiness is leaving many vulnerable...
Randall Munroe’s XKCD ‘Dinosaurs And Non-Dinosaurs’
via the comic artistry and dry wit of Randall Munroe, creator of XKCD Permalink *** This is a Security Bloggers Network syndicated blog from...
Why markets are worrying about Apple today
The human and environmental costs of the ongoing conflict in the Middle East are bad enough on their own, but there are other impacts likely...
ConFoo 2026: Guardrails for Agentic AI, Prompts, and Supply Chains
Montreal has a guardrail baked into its skyline. The “mountain restriction" keeps most buildings from rising higher than the cross on top of Mount...
Trending News
What cybersecurity actually does for your business
Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...
How SMBs use threat research and MDR to build a defensive edge
Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...
Protecting education: How MDR can tip the balance in favor of schools
Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response...
This month in security with Tony Anscombe – February 2026 edition
In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools 28 Feb 2026...
Mobile app permissions (still) matter more than you may think
Mobile Security Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious...
Faking it on the phone: How to tell if a voice call is AI or not
Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers. Phil Muncaster...
