Insights
Passkeys Hit Critical Mass: Microsoft Auto-Enables for Millions, 87% of Companies Deploy as Passwords Near End-of-Life
Breaking: Microsoft begins auto-enabling passkey profiles across all Microsoft Entra ID tenants this week, forcing the largest enterprise migration to passwordless authentication in history....
New macOS security feature will alert users about possible ClickFix attacks
Rumor has it that Apple deployed a new security feature in the fight against ClickFix. The new feature will be available for macOS Tahoe...
vDefend’s Built-in Advantage: Enable Closed-Loop Lateral Security for Zero-Trust Private Cloud
Cybersecurity strategy now shapes how enterprises design cloud platforms, application environments, and core infrastructure. The financial stakes are significant. The next step is architectural:...
RSAC 2026 Recap: From AI Hype to Real SaaS Security Outcomes
It felt as though every single conversation, booth, and presentation at RSAC 2026 mentioned AI. But beyond the sheer volume of messaging around this...
FIRESIDE CHAT: AI gives rise to a semantic attack surface, forcing a new class of network defense
By Byron V. Acohido SAN FRANCISCO — Enterprises rushing to deploy AI in their operations are opening a security exposure most of their existing...
New CCPA Rules Turn Your Privacy Policy into a Liability
California’s revised CCPA rules took effect on January 1, 2026, and they expose a gap that most compliance teams have been ignoring. After you’ve...
Trending News
RSAC 2026 wrap-up – Week in security with Tony Anscombe
This year, AI agents took the center stage – as a defensive capability, but more pressingly as a risk many organizations haven't caught up with...
A cunning predator: How Silver Fox preys on Japanese firms this tax season
Business Security Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when no one thinks twice about opening...
Virtual machines, virtually everywhere – and with real security gaps
Twenty years ago, almost to the day, Amazon Web Services (AWS) launched Simple Storage Service (S3). A few months later, the company’s Elastic Compute Cloud (EC2) service opened for public...
Cloud workload security: Mind the gaps
Business Security As IT infrastructure expands, visibility and control often lag behind – until an incident forces a reckoning Tomáš Foltýn 24 Mar 2026 • ...
Move fast and save things: A quick guide to recovering a hacked account
Cybercriminals go after people’s personal information across every kind of online platform, including WhatsApp, Instagram, LinkedIn, Roblox, YouTube and Spotify, not to mention finance apps....
EDR killers explained: Beyond the drivers
In recent years, EDR killers have become one of the most commonly seen tools in modern ransomware intrusions: an attacker acquires high privileges, deploys such...
