Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SMBs Hit a Cybersecurity Breaking Point as 91% Fear AI-Driven Attacks, Driving Shift to MSP-Led Security Models, WatchGuard Finds

LONDON, May 20 2026 -New research from WatchGuard Technologies, a global leader in unified cybersecurity for MSPs, reveals that while most businesses believe they are adequately staffed, the complexity, speed, and scale of modern threats - especially those powered by artificial intelligence - have outpaced what internal teams can realistically manage. The result is a fundamental shift away from do-it-yourself security toward externally delivered, always-on protection models.

Reduce CVE noise with OpenVEX assessments in Datadog

Software composition analysis (SCA) tools have become essential in modern security programs. They continuously scan software supply chains and match component fingerprints against Common Vulnerabilities and Exposures (CVE) databases to surface vulnerabilities in dependencies. SCA tools are effective at scale, but they introduce a persistent challenge: Not every flagged vulnerability actually presents a risk.

6 Core Principles of Incident Escalation in SOC Environments

Security incidents are rising with each passing year. The global cost of cybersecurity incidents was $10.5 trillion at the end of 2025. It is projected that data breaches will increase by 40% in 2026, as reported in SentinelOne. Security incidents are no longer isolated events. Many organizations use security systems such as SIEMs, EDRs, and identity telemetry, which generate alerts based on detection logic. While some controls can block the activity, others may allow it to continue undetected.

The MSP Evolution: From IT Support to Cybersecurity Leadership

For years, managed service providers (MSPs) have played a critical role in helping businesses maintain and support their IT environments. But today, the market is demanding something fundamentally different. Cybersecurity has become a continuous operational challenge, one that many SMB and midmarket organizations can no longer manage alone.

LLM Access Controls and Audit Logging for Security Teams: A Practitioner's Guide

Most organizations have an acceptable use policy for AI tools. Very few have controls that actually enforce it. The gap between what the policy says and what security teams can detect is where insider risk lives when it comes to large language model (LLM) usage.

Sophos Firewall and Synchronized Security

Sophos Firewall and Synchronized Security Synchronized Security is a unique capability you won’t get anywhere else. If you look at what’s required to properly secure a modern network, it breaks down into three pillars: hardening, protection, and detection and response. Or another way to look at it: being equal parts proactive and reactive - or what you need to do before, during, and after an attack.

GitHub internal repositories breached

A malicious VS Code extension led to cloned private repositories, reportedly offered for sale on a criminal forum On May 19-20, 2026, GitHub confirmed a security incident affecting its own internal systems. A threat actor self-identifying as TeamPCP, also tracked as UNC6780, compromised an employee’s developer device by way of a malicious Visual Studio Code extension and used that foothold to clone roughly 3,800 of GitHub’s internal repositories.

Why AI-era attacks demand deterministic defense

The security industry spent a good chunk of early 2026 debating whether Anthropic’s Mythos and OpenAI’s Daybreak are truly dangerous or just good marketing. It's a reasonable debate. But while we're having it, attackers are asking a different question: how do we use tools like this to move faster than defenders can respond?