How Non-Human Users Are Reshaping Business and Cybersecurity

How Non-Human Users Are Reshaping Business and Cybersecurity

The digital world is changing fast, and now AI agents are appearing as non-human users who act autonomously. They log in to systems, handle transactions, review data, and even negotiate or create things without people having to step in every time. This shift means greater overall demand for software and changes how work is done. However, this should prompt you to consider online trust and security.

World Backup Day: The New Reality of Data Resilience

World Backup Day: The New Reality of Data Resilience

Ransomware has evolved; attackers now hunt for backup systems before launching the main strike. They slip into an environment, corrupt the recovery chain, then trigger…

Detecting Dangling SaaS Subdomains and Real Subdomain Takeovers

Detecting Dangling SaaS Subdomains and Real Subdomain Takeovers

Subdomain takeover is one of those vulnerabilities that refuses to die. Every few years it gets rediscovered, scanners add more signatures, and reports get louder,…

DROP drops for consumer privacy

DROP drops for consumer privacy

California this year launched an online site to put teeth into the 2023 California Delete Act. It could be the most powerful privacy tool consumers…

Why Human Risk Management is vital in the age of Artificial Intelligence

The rapid evolution of AI has inaugurated a new era of productivity and efficiency across industries. From autonomous workflows thatmore

AI industry at a crossroads

AI industry at a crossroads

The AI industry appears to be reaching a crossroads that will determine its future in the next two years. The only clear outcome is it…

The Human Firewall Is Failing: Can Safe AI Reinforce It?

Attackers increasingly rely on AI to influence behavior in real time. Cyber defense systems are now turning to personalized, trustworthy AI platforms to reduce human-driven…

Pig butchering: Proving the Luddites right

Pig butchering: Proving the Luddites right

Pig-butchering may be proving the Luddites were right. The social-engineering scam bypassed ransomware as the most profitable cybercrime approximately two years ago. After government regulations…

Turning the corner on cyber insurance

Turning the corner on cyber insurance

It seems like the insurance industry is turning the corner on cyber insurance and making a decent profit in the process. But not every industry…

Opinion: Deprioritize social media for peace

Opinion: Deprioritize social media for peace

Finding content from legacy media is getting difficult in social media by design of the management of social media companies, while information from radicalized groups,…

7 Most Dangerous Cybersecurity Threats

7 Most Dangerous Cybersecurity Threats

In the ever-evolving landscape of technology, each year brings a new set of cybersecurity threats that can put your digital life and sensitive information at…

From Coders to Protectors: Women’s Influence in Cybersecurity

From Coders to Protectors: Women’s Influence in Cybersecurity

The need for knowledgeable people to safeguard our online environment has increased. In this context, women have become significant influences in cybersecurity.

AI is at war with itself

AI is at war with itself

It almost seems that the AI market is an industry at war with itself.

We keep advertising at a minimum to maintain independence. That means we need support from our readers.

How about you buy us a coffee?

Hollywood strikes fight over ownership of biometrics

Hollywood strikes fight over ownership of biometrics

Everybody is going to own their own data. I'm going to own my own data. You going to own your own data. Your mother, your…

How companies are helping customers take responsibility for security

How companies are helping customers take responsibility for security

The goal of these companies is to make the job of protecting user data easier for the user

Book Review: Data for All by John K. Thompson

Book Review: Data for All by John K. Thompson

Data for All by John K. Thompson

The Looming Identity Crisis

The Looming Identity Crisis

Rohit Ghai, CEO of RSA Security

Getting a handle on generative AI, before it gets a handle on us

Getting a handle on generative AI, before it gets a handle on us

No model if you stop at one and two is of any value unless it can sort out whether the information sources that it's actually…

What’s up with TikTok

What’s up with TikTok

TikTok is like a Dickens novel. It’s the best of apps. It’s the worst of apps. There seems to be no in-between. Over the next…

Reporter’s notebook: Taking a CNAPP

Reporter’s notebook: Taking a CNAPP

Cloud-native application protection platforms (CNAPP) emerged as an industry niche around 2021, when Gartner coined the term to describe to consolidate cloud‑security capabilities under a single term. The niche evolved as organizations adopted cloud-native technologies and needed integrated security solutions.…

Scam Bucket: Think before you click unsubscribe

Scam Bucket: Think before you click unsubscribe

You’ve done this many times. Checking your email you find a ton of spam, especially from this one organization or person. You are finally tired…

Poor marketing endangers society

Poor marketing endangers society

n the past few weeks, as various security companies have published multiple studies about the state of cybersecurity, a common theme has arisen: Executives running…

Scam Bucket: Innocence is no replacement for digital vigilance

Scam Bucket: Innocence is no replacement for digital vigilance

On Mastodon a poster asked last week, “Looking for an article or blog or text, that succinctly describes, at grade 1 level English, why ‘if…

Elder fraud festers out of control

Elder fraud festers out of control

As legislatures around the world try to get a handle on the growth of ransomware, another category of cybercrime is festering out of control: Elder…

IAM in a shifting environment

IAM in a shifting environment

The fourth annual Identity Management Day (April 9) brought the opportunity to assess and evaluate the shifting environment plaguing Identity and Access Management (IAM). Identity…

A lesson on election security from tea ladies

A lesson on election security from tea ladies

Our current election season faces the same problems as in 2016 and 2020. Foreign adversaries are interfering with the election process. This time we know…

Privacy Not Included Group dings Amazon this year

Privacy Not Included Group dings Amazon this year

That doesn’t mean you shouldn’t buy those whizbang, nifty gifts this weekend, you just need to go into it knowing what you are unleashing upon…

Bolstering Workforce Security During Summer Holidays

Bolstering Workforce Security During Summer Holidays

While we all crave relaxed summer getaways, it’s crucial to understand that adversaries never go on vacation. Unlike in schoolsmore

Boosting digital hygiene without technology

Boosting digital hygiene without technology

When they discuss issues in meetings, we all agree on a passphrase for whatever decision maker is chosen. It’s not shared in emails, texts, or…

Protection against DDoS attacks: do’s and don’ts

Protection against DDoS attacks: do’s and don’ts

The wave of DDoS attacks that flood the Internet daily made everyone aware of the relevance of tDDoS attacks. The question is how to properly…

Cheat Sheet: 3 Best Tips for Safer Internet Day

Cheat Sheet: 3 Best Tips for Safer Internet Day

Today is Safer Internet Day and we thought we'd try a bit of click-baiting. That explains the headline and, coincidentally, also what this article is…

Scam Bucket: Microsoft reveals year-old Franken-phish campaign

Scam Bucket: Microsoft reveals year-old Franken-phish campaign

Ever heard of Franken-phish? It's a campaign that targets Microsoft 365 users. It sells kits comprised of components of other kits readily available on the…

Vibe coding faces rough growing pains

CISA is dead. Long live CISA?

Scam bucket: Ticket fraud is for suckers

Prediction 2026: Beginning of the end of the WWW

When predictions fail

Defining Dysinformation

Is cyber training worth the effort?

The problem with proxies

Bolaji Ojo and renewed importance of the press

Living Security AI-Native HRM Platform Reduces Risk

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.