Insights

Fairwinds Insights Release Notes: Kyverno Integration & GPU Metrics

Over the last several months, we’ve expanded Fairwinds Insights to give platform and operations teams deeper visibility into both policy posture and infrastructure metrics...

One Foothold, 25 Million Victims: The Risk Inside Modern Breaches

In last month’s reporting cycle, we saw one of the largest healthcare data breaches in U.S. history, ransomware groups tied to North Korea targeting...

Pentagon ditches Anthropic AI over “security risk” and OpenAI takes over

On Friday the US Pentagon cut ties with Anthropic, the company behind Claude AI. Defense Secretary Pete Hegseth designated the San Francisco-based company a...

Zero Trust Implementation Roadmap: 5 Stages from Legacy to Modern Security

Here's the honest truth about Zero Trust implementations: most of them fail to deliver. Not because the model is flawed. Because organizations approach it...

Zenity Details Perplexity AI Browser Vulnerability

Zenity, a provider of a platform for securing artificial intelligence (AI) applications and agents, today detailed how a zero-click attack could be launched against...

Finally, CTEM and MITRE INFORM Without the Jargon

Your vulnerability scanner just came back with 10,000 findings. Your pen test report has a 47-page appendix. Your threat intel feed is piling up...

Trending News

This month in security with Tony Anscombe – February 2026 edition

In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools 28 Feb 2026...

Mobile app permissions (still) matter more than you may think

Mobile Security Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious...

Faking it on the phone: How to tell if a voice call is AI or not

Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers. Phil Muncaster...

PromptSpy ushers in the era of Android threats using GenAI

ESET researchers uncovered the first known case of Android malware abusing generative AI for context-aware user interface manipulation. While machine learning has been used to...

Is Poshmark safe? How to buy and sell without getting scammed

Like any other marketplace, the social commerce platform has its share of red flags. It pays to know what to look for so you can...

Is it OK to let your children post selfies online?

Kids Online When it comes to our children’s digital lives, prohibition rarely works. It’s our responsibility to help them build a healthy relationship with tech....