The UK’s phone theft crisis is a wake-up call for digital security

Phone theft is now commonplace in London. The Met Police recently revealed that it seizes 1,000 stolen phones weekly as it cracks down on organized criminal networks driving the £50 million trade. Nationally, cases have doubled to 83,900 annually. The … Continue reading The UK’s phone theft crisis is a wake-up call for digital security

Strategic AI readiness for cybersecurity: From hype to reality

AI readiness in cybersecurity involves more than just possessing the latest tools and technologies; it is a strategic necessity. Many companies could encounter serious repercussions, such as increased volumes of advanced cyber threats, if they fail to … Continue reading Strategic AI readiness for cybersecurity: From hype to reality

Why shorter SSL/TLS certificate lifespans matter

Digital certificates are the unsung heroes of the internet, silently verifying that the websites, apps, and services you use are legit and your data is safe. For years, we’ve leaned on certificates with maximum validity term stretching for months and, … Continue reading Why shorter SSL/TLS certificate lifespans matter

How to find out if your AI vendor is a security risk

One of the most pressing concerns with AI adoption is data leakage. Consider this: An employee logs into their favorite AI chatbot, pastes sensitive corporate data, and asks for a summary. Just like that, confidential information is ingested into a thi… Continue reading How to find out if your AI vendor is a security risk

Excessive agency in LLMs: The growing risk of unchecked autonomy

For an AI agent to “think” and act autonomously, it must be granted agency; that is, it must be allowed to integrate with other systems, read and analyze data, and have permissions to execute commands. However, as these systems gain deep access to info… Continue reading Excessive agency in LLMs: The growing risk of unchecked autonomy

April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft

Microsoft is continuing to build on their AI cybersecurity strategy and this month announced the introduction of new agents in Microsoft Security Copilot. They are introducing agents for phishing triage, alert triage for data loss prevention and inside… Continue reading April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft

7 ways to get C-suite buy-in on that new cybersecurity tool

You’re in the middle of a sprint, juggling deadlines, debugging code, fine-tuning pipelines, and then it happens—you stumble across the perfect cybersecurity tool. It promises to eliminate secrets in logs, reduce risks in CI/CD pipelines, and save coun… Continue reading 7 ways to get C-suite buy-in on that new cybersecurity tool

How to map and manage your cyber attack surface with EASM

In today’s digital landscape, understanding your organization’s attack surface is crucial for maintaining robust cybersecurity. To effectively manage and mitigate the cyber-risks hiding in modern attack surfaces, it’s important to ado… Continue reading How to map and manage your cyber attack surface with EASM

How to build an effective cybersecurity simulation

Most people groan at the prospect of security training. It’s typically delivered through dull online videos or uninspiring exercises that fail to capture real-world urgency. To make a real difference in cyber crisis readiness, personnel need the opport… Continue reading How to build an effective cybersecurity simulation

Two things you need in place to successfully adopt AI

Organizations should not shy away from taking advantage of AI tools, but they need to find the right balance between maximizing efficiency and mitigating organizational risk. They need to put in place: 1. A seamless AI security policy AI may have previ… Continue reading Two things you need in place to successfully adopt AI