
Massive Increase in Non-Human Identities Threatens Seemingly Secure Security Postures
Non-human identities such as API keys, OAuth tokens, AI agents, and service accounts, now surpass human identities by 144 to 1.

Non-human identities such as API keys, OAuth tokens, AI agents, and service accounts, now surpass human identities by 144 to 1.

Strong words from Duck and David! (But with humor and good grace throughout.)

Duck and David have a spirited but not irreverent discussion about metrics and measurement. Well, not too irreverent…

It’s binding for federal agencies, but worth your attention even if you’re not bound by it yourself.

The biggest threat in 2026 isn’t going to be a new AI-enabled social engineering scam – it’s more likely to be cyber fatigue.

Supply chain hacks are high impact. The average cost of a breach is $4.4 million.

As cybersecurity battle cries go, “Assume breach” isn’t very convincing. Here’s how to adopt a more positive, proactive mindset.

You can still pay hush money, but you have to report it.

Learn what SOC 2 tells you about your suppliers, as well as how to make the most of the experience if you’re thinking of going for SOC 2 in your own business.

Cybersecurity is no longer a “nice to have.” It’s a necessity for businesses of all sizes in all industries – whether or not they have a full-scale security team to implement and manage the program. However, setting up a cybersecurity program is significant work, and keeping up with best practices is challenging, even for large organizations. That’s why public cybersecurity frameworks have been developed. Cybersecurity frameworks are sets of standards and processes that businesses use to implement and manage security […]

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






