News

Encrypted Client Hello (ECH) has been in the news a lot lately. For some background and relevant and recent content, see: ...
Executives are under digital siege—and most don’t even know it. Related: Shareholders sue over murder At RSAC 2025, I sat ...
Microsoft is phasing out password features in Authenticator. Transition to Edge for autofill and explore passwordless authentication. Learn more!
How k0s, a lightweight Kubernetes distribution, joins the CNCF Sandbox, enhancing cloud-native computing. Explore its features today!
The Fullscreen BitM Attack disclosure is part of the Year of Browser Bugs project. Every month, SquareX’s research team releases a major web attack that focuses on architectural limitations of the ...
Nothing significant yet - We have or will have generative AI in our applications but haven’t yet researched or explored the ...
Discover the implications of the 19 billion passwords leaked in the RockYou2024 breach. Learn essential actions to secure your accounts now!
A hybrid security model provides the ability to deploy a variety of rule sets for specific applications while providing a single, centralized way to manage it all.
An identity threat detection approach built on access intelligence is key to identifying and disrupting campaigns like Volt Typhoon.
The growth of AI agents puts the need for robust API authentication practices front and center, so today we’re highlighting two AI agent scenarios and how you could deal with their typical ...
A new report from Varonis examines nearly 10 billion files and suggests that AI is a ticking time bomb for your data.
The Next Security Challenge Human risk isn’t new. It’s growing faster, showing up in more places, and catching many organizations off guard... The post Human Risk Management: The Next Security Challen ...