Insights
How to see your Google Search history (and delete it)
Your Google Search history provides one of the most detailed windows into your private life, and I know this because when I looked at...
Zero Trust for B2B SaaS: What Every Founder and CTO Needs to Know
There's a conversation that plays out in enterprise sales cycles thousands of times a day. A promising deal has been progressing well. The buyer's...
USENIX Security ’25 (Enigma Track) – Security Theater Is Canceled: Time For A Real Show
Author, Creator & Presenter: Lea Kissner, LinkedIn Our thanks to USENIX Security ’25 (Enigma Track) (USENIX ’25 for publishing their Creators, Authors and Presenter’s...
OMB Rolled Back the Rules. Security Did Not Get Easier
The U.S. Office of Management and Budget (OMB)’s decision to rescind M-22-18 and M-23-16 and replace them with M-26-05 has been framed as a...
Inference protection for LLMs: Keeping sensitive data out of AI workflows
As organizations accelerate their adoption of large language models, data privacy and security concerns have emerged as one of the biggest barriers to enterprise...
AI Just Made Executives the Easiest Targets on the Internet
The next time someone targets your CEO, they most likely won’t be a nation-state operative or a professional cyberattacker. They may be a disgruntled...
Trending News
What cybersecurity actually does for your business
Business Security The ability to continue operating safely in an unsafe environment where competitors cannot is a competitive advantage that is rarely measured or discussed...
How SMBs use threat research and MDR to build a defensive edge
Corporate IT and security teams have the unenviable task of keeping relentless and increasingly sophisticated adversaries at bay. They’re often faced with limited resources and...
Protecting education: How MDR can tip the balance in favor of schools
Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How can managed detection and response...
This month in security with Tony Anscombe – February 2026 edition
In this roundup, Tony looks at how opportunistic threat actors are taking advantage of weak authentication, unmanaged exposure, and popular AI tools 28 Feb 2026...
Mobile app permissions (still) matter more than you may think
Mobile Security Start using a new app and you’ll often be asked to grant it permissions. But blindly accepting them could expose you to serious...
Faking it on the phone: How to tell if a voice call is AI or not
Can you believe your ears? Increasingly, the answer is no. Here’s what’s at stake for your business, and how to beat the deepfakers. Phil Muncaster...
