Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

One Identity Appoints Michael Henricks as Chief Financial and Operating Officer

One Identity, a trusted leader in identity security, today announced the appointment of Michael Henricks as Chief Financial and Operating Officer. This decision reflects the continued growth of the business and a focus on aligning financial leadership with operational objectives as One Identity scales.

AI Misinformation as a Cyber Risk - What UK SMEs Need To Know

A recent BBC investigation highlighted how easily large-scale AI models can be influenced by misleading content scraped from the web. Within hours of a deliberately false article being published, multiple generative AI systems were repeating the fabricated facts as if they were true. This was not a code flaw; it was a predictable outcome of how these models process and prioritise input.

Automated evidence collection for compliance: All you need to know

Organizations today are expected to maintain continuous compliance with evolving security standards and regulations, resulting in an enormous volume of evidence. Manually collecting and managing substantial evidence documentation is not practical when controls and scrutiny increase. The process is slow, error-prone, difficult to scale, and takes your team away from high-value security tasks.

What Is Kiosk Mode and How Does It Work?

Customer engagement plays a major role in how businesses retain users and build lasting relationships. Whether it’s a retail store, a logistics operation, or a healthcare facility, the way people interact with devices directly impacts efficiency and experience. This is where kiosks come in. Modern businesses increasingly rely on POS and kiosk-driven interactions to simplify workflows and improve customer satisfaction.

UEM vs. EMM: What's The Difference?

68% of companies suffered endpoint attacks that compromised sensitive data, 28% of those involved stolen or hacked devices. — Study by Ponemon Institute Here, the problem is not just mobile devices anymore. It’s laptops, tablets, IoT sensors, rugged field devices, third-party vendor systems, all accessing corporate data from everywhere. And this is where the confusion begins: Should an organization rely on Enterprise Mobility Management (EMM)?

How AI Agents Impact SOC 2 Trust Services Criteria

SOC 2, which stands for Systems and Organization Controls 2, is a framework developed by the American Institute of Certified Public Accountants (AICPA) to evaluate controls for security, availability, processing integrity, confidentiality, and privacy. As agentic AI systems begin acting autonomously, AI and SOC 2 compliance become closely linked. These systems drive new efficiencies, but also introduce new risks.

How Do CNAPP Platforms Help Prevent Misconfigurations Across Multi-Cloud Environments?

Cloud misconfigurations rank among the leading causes of cloud security incidents across AWS, Azure, and Google Cloud Platform. CNAPP platforms deliver cloud security posture management (CSPM) with continuous detecting misconfigurations in multi-cloud environments, automated remediation for cloud misconfiguration, and unified policy enforcement.

New Apono Report Reveals 98% of Cybersecurity Leaders Are Slowing Agentic AI Adoption Due to Insufficient Security Controls

Report finds growing tension between AI acceleration goals and security readiness as autonomous systems move toward production NEW YORK — February 2026 — Apono, the cloud-native Privilege Access Management platform securing human and agent identities, today released The 2026 State of Agentic AI Cyber Risk Report, a global study examining how enterprises are approaching agentic AI adoption amid rising security concerns.

How Conduent Lost 25 Million Records in 83 Days: The DLP Failure Everyone Missed

For 83 days, attackers moved freely through Conduent's systems and exfiltrated 8 terabytes of healthcare records, Social Security numbers, and personal data belonging to tens of millions of Americans. No alarm sounded. No transfer was blocked. The breach was discovered when systems stopped working. Not because anyone detected the data leaving.