When Research Becomes a Crime: The New Risk Landscape for OSINT and Dark Web Intelligence
There has always been an uncomfortable truth at the core of serious cyber threat intelligence work: To understand threat actors,...
There has always been an uncomfortable truth at the core of serious cyber threat intelligence work: To understand threat actors,...
There is an old saw in privacy and data breach litigation: Everyone gets paid—except, often, the victims. Plaintiffs’ lawyers receive...
There is a certain irony in watching a statute designed to prevent clandestine eavesdropping on telephone calls become one of...
There is an almost reflexive habit in data engineering: whenever you instrument an event, you attach a user ID. It...
There is a lot of noise right now around AI and cybersecurity. Some of it is breathless. Some of it...
But analysts caution that the path there is far from straightforward. “For Meta-scale firms, agent-led engineering is achievable only in...
IntroductionThere was a significant increase in software supply chain attacks in March 2026. There were five major software supply-chain...
There is a category mistake that happens all the time in the non-human identity (NHI) market. People talk about...
There have been plenty of warnings about job losses due to AI, particularly in the world of IT and in...
“There is an increased focus on securing enterprise clients by OpenAI,” said Anushree Verma, senior director analyst at Gartner. “The...
There is a Seinfeld episode I think about more often than I probably should. In “The Opposite,” George Costanza...
There is a gap in enterprise security that the industry has been talking around for years without naming it...
There is a certain poetic justice in a cybersecurity-related story that has emerged from Moscow this week: A man has...
An analysis of cybersecurity attacks published today by the X-Force arm of IBM finds there was a 44% increase...
In the world of cybersecurity, there are “loud” companies, the ones whose logos you see on every corner, and...