The real challenge for security leaders is gaining a clear view of how people really behave in those moments where technology can’t step in and take control
Threat actors increasingly focus on exploiting human behaviour, knowing that users are often the weakest security link. MFA bombing is an example of this trend
Much effort has gone into assessments of the robustness of IT infrastructure. Critical frontline workers haven’t always been properly considered as part of this
Shadow AI has become pervasive, exposing businesses to potential data leaks, compliance breaches and reputational damage – and a lack of oversight is to blame
Document protection should start at file creation and include encryption, permission controls, secure sharing, version tracking and verifiable digital signatures
Security is not always aligned with a perfect user experience; but trying to eliminate friction entirely has led many organisations down a dangerous path