Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Top 5 Cyber Threats That Targeted Small Businesses in 2025

As we look back at 2025 and onward, there are five cyber threats that stand out as the most pressing for small businesses. No single solution eliminates cyber risk. The most effective strategy for small businesses is to combine multiple layers of defense. Endpoint security, email filtering, secure backups, and continuous education together create a much stronger posture than any one tool can provide on its own.

How strategic CISOs turn AI risks into competitive advantages

As the flurry of excitement over fresh AI innovation begins to fade, risk leaders, heads of GRC and CISOs have a new challenge to tackle. Regulators, customers, and boards are all asking harder questions about how AI is used, secured, and audited. For CISOs, AI governance is now a board-level expectation. Some organizations will be able to confidently show their measured and documented approach to AI governance.

Top 12 Privileged Access Management (PAM) Use Cases in 2026

Privileged Access Management (PAM) is your organization's security control center for managing and monitoring high-level access to critical systems. Think of it as a sophisticated vault system that safeguards your most powerful administrative credentials while maintaining detailed audit trails of their usage. As we head into 2026, PAM has become crucial. Here's why: Cyberattacks are getting scarier and more complicated.

New AMOS Infection Vector Highlights Risks around AI Adoption

During a recent investigation into AMOS InfoStealer, Kroll Threat Intelligence Team has discovered a troubling new delivery vector that leverages the growing trust users place in AI tools. In this case, attackers leveraged ChatGPT as the source of guidance, tricking victims into initiating the infection, presenting it as a legitimate solution to a common technical problem. Victims were tricked into believing they were running a harmless command to fix a sound issue on their Mac device.

Evolving security at Datadog: How we designed roles to support a growing organization

Defining success looks different for security organizations than it does for product, infrastructure, and other engineering teams. The latter group can often point to tangible outcomes, such as newly shipped features or performance improvements. Security orgs succeed when risks are lowered and the company’s posture improves over time, which are results that aren’t as easy to recognize but still valuable.

Solving Human Risk: Build a Measurable, Security-First Culture

We've previously addressed the foundational problems of visibility and automated human risk management. However, the final, most enduring challenge remains: how do you address the human element that lies at the core of human cybersecurity risk? Now more than ever, users are prime targets for attackers, but the traditional playbook offers little more than check-the-box training (which is often easily forgotten).

Agentic AI Security: The Emerging Fourth Pillar of Cybersecurity

For decades, cybersecurity has been organized around three dominant pillars: endpoint security, network security, and cloud security. These domains have shaped technology categories, vendor ecosystems, and enterprise budgets. They have matured into multi-billion-dollar markets, each responding to successive waves of digital transformation. However, a tectonic shift is underway.

How to test incident response readiness through red team exercises

Incident response (IR) plans are a cornerstone of organisational resilience. Many businesses maintain policies, run tabletop exercises, and document procedures, but high-impact incidents still expose gaps in real-world response. Red team exercises provide a practical, objective-driven way to test incident response readiness.

WP 29 Automotive Cybersecurity and Beyond - How India and China Are Now Driving Global Trends

When UNECE WP.29 came into force, it transformed the global automotive industry. For the first time, cybersecurity became a mandatory requirement for modern vehicles — not a marketing feature, not a technical add-on, but a regulated obligation. WP.29 forced manufacturers to rethink how vehicles were designed, updated and secured, requiring formal Cybersecurity Management Systems (CSMS) and Software Update Management Systems (SUMS) across the entire vehicle lifecycle.

Falcon Shield Evolves with AI Agent Visibility and Falcon Next-Gen SIEM Integration

CrowdStrike is introducing two powerful innovations in CrowdStrike Falcon Shield to stop identity-based attacks in the AI era: a centralized view of AI agents across platforms and the integration of first-party SaaS telemetry into CrowdStrike Falcon Next-Gen SIEM — the industry’s first native integration of SaaS security posture management (SSPM) and next-gen SIEM.