
Massive Increase in Non-Human Identities Threatens Seemingly Secure Security Postures
Non-human identities such as API keys, OAuth tokens, AI agents, and service accounts, now surpass human identities by 144 to 1.

Non-human identities such as API keys, OAuth tokens, AI agents, and service accounts, now surpass human identities by 144 to 1.

You can outsource your work, but not your responsibility.

Most companies today have too many tools and not enough clarity.

Insider threats often involve bribery, corruption, and cold hard cash. But not always…

Here’s how ID-based attacks can impact companies.

Will we ever conquer the scourge of ransomware? Can rules and regulations help?

You can still pay hush money, but you have to report it.

23andMe has loads of DNA samples that they are looking to sell. What to do?

Physical security measures should be part of your overall security strategy.

Critical infrastructure organizations have seen a swell of attacks in the past few years. We examine why.

Organizations are becoming more aware of the need for MDR (managed detection and response) services to achieve real cyber resiliency. The increase in the quantity and sophistication of cyberattacks means that other, siloed solutions, fall short of fully protecting your organization. Whereas no one can guarantee that you won’t fall victim to a cyberattack, the use of MDR significantly decreases that risk and its overall impact. Implementing MDR also gives you the greatest chance of effectively and rapidly recovering from […]

Join us for the fascinating story of how researchers in the UK and the US challenged received wisdom, and discovered how to share encryption keys securely, even with people you’ve never met.

Data breaches are at an all-time high, with the number of breaches almost doubling from 2022 to 2023. Most recently, CBS reported on a massive data breach that could likely contain the social security numbers (SSNs) of every US citizen. It’s a major leak of personally identifiable information (PII) and only adds to the amount of sensitive data, such as passwords and addresses, that has been leaked over the last decade. Although it’s easy to think that leaked PII in […]

What if we all adopted a cybersecurity culture anchored in value and quality, instead of a race-to-the-bottom predicated on cheapness and quantity?

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






