Threat actors increasingly focus on exploiting human behaviour, knowing that users are often the weakest security link. MFA bombing is an example of this trend
For telecommunications security teams, the challenge is not just spotting suspicious activity but assembling evidence quickly enough to understand what happened
As regulations such as NIS2 and DORA tighten and cyber-attacks grow more sophisticated, mid-sized UK organisations face enterprise-level expectations without enterprise-level resources
As AI-assisted cyber-crime evolves, autonomous systems are beginning to execute intrusion campaigns end-to-end. The question is no longer only how organisations use AI to defend themselves, but how they defend against AI systems that operate with minimal human direction
Rob Collins, APAC Director of Pre-sales Systems Engineering at Cylance, asks whether Endpoint Detect and Response (EDR) is the answer to endpoint protection.
Etienne Greeff, CTO and co-founder, SecureData, on why safeguarding your endpoint security matters now more than ever amidst the digital revolution powered by the Internet of Things (IoT).